Key Insights Blog
Read the latest insights from our experts on Cybersecurity and Risk management for SAP.
June 16, 2020
#patch, #sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
Category: SAP Patchday
June 9, 2020
#s4hana, #sapsecurity
Quite a few SAP customers are currently migrating their systems to the new S/4HANA platform. This represents a great opportunity to re-think security and harden S/4HANA right from the outset. However, there are several challenges to securing S/4HANA. Despite sharing numerous settings with the “old” SAP Business Suite, some things are fundamentally different in S/4HANA.
Category: Security News
May 26, 2020
On 25th of May 2020, ABEX has published a new minor version of SecurityBridge for SAP. This post summarizes the highlights of the recent release.
Category: Release highlights
May 25, 2020
In the last major release 4.7, SecurityBridge introduced the Security & Compliance Manager. 4.71 contain first enhancement inspired by our early adopter community and many more features.
Category: Release highlights
May 22, 2020
#sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
Category: Security News
May 22, 2020
#sapsecurity
Being reactive is simply not enough. If threat actors didn’t innovate, security providers wouldn’t need to either. It’s their ability to imagine new ways to hurt us, and then execute them at speed, that has left us trying to guess the next move.
Category: Security News
May 22, 2020
Even though SAP systems run on regular operating systems and databases, the application itself uses very specific standards and formats for exchanging and storing data. This article explains the top reasons chief security officer's neglect SAP Security
Category: Uncategorized
Find recent Security Advisories for SAP©
You like it?
Share it!
Share on linkedin
Share on twitter
Share on whatsapp
Share on email
2nd CROSSTHEBRIDGE
Cycling event
Join our cycling community on September 9th in Brabant (NL), get a SecurityBridge cycling shirt and enjoy a wonderful day.