Skip to content

Articles sharing relevant insights into security news, operations, recent incidents and data breaches but also provide guidance for SAP running enterprises.

External vs. Internal SAP Cybersecurity Risks: The...

Recently, we gave an insight into the known SAP attackers in our blog. Of course, it can already be deduced from this that there are internal and external SAP attackers. That is why today, we want to look at this from an SAP cybersecurity risk perspective.

Read More

SAP Business Technology Platform (SAP BTP) Security...

Certainly, inspired by the many conversations we had at this year’s DSAG Annual Congress 2022, it is time to give some insights into the SAP Business Technology Platform. As a software vendor with a core focus on SAP security, it is our job to look at the security concerns of new SAP technology. Our approach is to understand our customers’ concerns and integrate effective and efficient solutions into our cybersecurity solution for SAP. The SAP Business Technology Platform is the talk of the town and seems to be SAP’s new winning concept.

Read More

The difference between SAP Patch Management and...

Believe it or not, I’ve probably attended more customer meetings in 2022 than ever before. And the question about the difference between SAP Patch Management and SAP Vulnerability Management keeps appearing. To give a conclusively answer, we need to take a closer look at the two separate areas.

Read More

SAP Security Dashboard...

Whether security in SAP environments is relevant is not up for debate anymore. The SAP secure operations map has been around for a long time (when I worked at SAP as a product manager, it was called SAP Security Solution Map) and provides a 360-degree view of SAP security. Let’s take a deeper look:

Read More

How to master SAP code vulnerabilities in...

After reading the title, you’re probably thinking – Why should legacy code be handled differently than new coding? Well, let’s draw up a real-life scenario to illustrate the challenges:

Read More

How to use the S/4HANA migration to...

“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking.

Read More

SAP Cloud Connector...

Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.

Read More

Why we do our #CrossTheBridge cycling event...

It was John F. Kennedy who once said: “nothing compares to the simple pleasure of a bike ride”. And what a pleasure it has been! We had our annual bike ride with friends from Accenture, Deloitte, CGI, McCoy, Thales, KPN, Hunt &Hacket, and security leaders from major customers. We had a lot of opportunities for exchange in the cozy atmosphere among like-minded people who all love road cycling and have SAP Security improvement in mind.

Read More

SecurityBridge at the DSAG22...

Together with its partner, Fortinet, the SAP Security specialist company will present how to close the gap between SAP and network security in Leipzig.

Read More