Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

July 14, 2020
#patch, #sapsecurity
We are rapidly approaching summer vacation. Despite the holiday season the SAP Security Response team remains very active also with this months patchday. Today, the 14th of July 2020, 7 new patches and 2 updates to existing patches have been released.
Category:
July 13, 2020
#2fa, #compliance, #gdpr, #sapsecurity
Gear up your SAP Logon process using 2 factor authentification. 2FA, typically demands two components to co-exist, in the same place, at the time of login. In practice, this typically means the end-user has a physical device such as a SmartCard, and a memorized PIN number.
Category:
July 7, 2020
#audit, #compliance, #gdpr, #sox
In information technology, compliance and security are inseparable. For SAP systems, this relatively simple relationship between compliance and security becomes a little bit more complicated, read more to learn about the reasons.
Category:
July 1, 2020
#s4hana, #sapsecurity
Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.
Category:
June 18, 2020
#interface, #rfc, #sapsecurity
Latest addition to the SecurityBridge suite is a fully integrated interface monitor, which visualizes RFC interface connectivity across your SAP landscape. Through a bird’s eye view security critical traffic and vulnerable interfaces can easily be spotted.
Category:
June 16, 2020
#patch, #sapsecurity
On the 9th of June 2020 the SAP Product Security Response Team released 18 patches out of which 1 contains an update from a previous release. Every second Tuesday of the month the team publishes corrections and recommendations, which fix known vulnerabilities discovered within SAP products.
Category:
June 16, 2020
#rfc, #sapsecurity
Over and over again we see attackers who have gained unauthorized access to a system by spending a significant amount of time spying out relevant SAP data, unnoticed by the victim organization. In a recent incident, we identified a large number of information gathering and data collection activities carried out by a threat actor prior to the exfiltration of sensitive data - which, if leaked, would inevitably lead to reputation and/or financial loss for the organization.
Category:
June 16, 2020
#patch, #sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
Category:
Find recent Security Advisories for SAP©

You like it?
Share it!

Share on linkedin
Share on twitter
Share on whatsapp
Share on email

SAP Sicherheit auf dem Prüfstand – Ein ganzheitlicher Ansatz

#ITOK21 | IT-Onlinekonferenz.de | Helge Sanden und Christoph Nagy
Ständig hört man von Cyberangriffen und die meisten Unternehmen haben bereits …
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.