Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

May 22, 2020
#sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
Category:
May 22, 2020
#sapsecurity
Being reactive is simply not enough. If threat actors didn’t innovate, security providers wouldn’t need to either. It’s their ability to imagine new ways to hurt us, and then execute them at speed, that has left us trying to guess the next move.
Category:
May 22, 2020
Even though SAP systems run on regular operating systems and databases, the application itself uses very specific standards and formats for exchanging and storing data. This article explains the top reasons chief security officer's neglect SAP Security
Category:
May 22, 2020
In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.
Category:
May 22, 2020
On 04.05.2020 / 23:19 CET/CEST SAP SE published an ad-hoc news informing their investors about a security shortcoming affecting some products of their cloud portfolio. On-Premise customers are not impacted. The company emphasizes that no cyber security incident was found.
Category:
Find recent Security Advisories for SAP©

You like it?
Share it!

Share on linkedin
Share on twitter
Share on whatsapp
Share on email

Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.