Skip to content

Blog

Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

April 25, 2024
#sapsecurity
SAP Authorization Objects for SAP NetWeaver AS ABAP technologies are not just blockers. They are the ENABLER of access.
Category:
April 22, 2024
#sapsecurity
SAP Security teams can kick-start a comprehensive security platform and gain significant improvements already within a day. What they need is a holistic platform and a guided approach to SAP Security.
Category:
April 16, 2024
#sapsecurity
This article explores the differences between the 2 processes and how they can help bolster the security of SAP systems.
April 9, 2024
#patch, #sapsecurity
For April 2024, 10 new Security Notes have been released and 2 have been updated. What stands out is that there are no ‘Hot News’ notes in this release. But let that not be a reason to ‘lower your guard’! We explore some interesting highlights below.
April 5, 2024
#sapsecurity
Recently, we have seen the release of several SAP Security notes that address the so-called ‘Rapid Reset Attack’ vulnerability. In this blog, we will zoom in on this vulnerability, look at how it affects SAP systems, and what counter measures can be taken.
April 3, 2024
#sapsecurity
Kontron und SecurityBridge schließen eine strategische Partnerschaft für eine verbesserte IT-Sicherheit von SAP-Systemen ab.
March 28, 2024
#sapsecurity
SecurityBridge Unveils Platform Version 6.26: A Singular Solution For SAP Security Across On-Prem And Cloud. This latest addition introduces a suite of advanced features to fortify SAP environments and address global enterprises' evolving security needs.
March 26, 2024
#sapsecurity
This article highlights the importance of securing the 3 layers of an SAP system to prevent unauthorized access to critical business data.
Find recent Security Advisories for SAP©

You like it?
Share it!

Taking the Taboo out of S_TABU Authorization Objects

SAP Authorization Objects for SAP NetWeaver AS ABAP technologies are not just blockers. They are the ENABLER of access.
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.