Skip to content

Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

June 9, 2020
#s4hana, #sapsecurity
Quite a few SAP customers are currently migrating their systems to the new S/4HANA platform. This represents a great opportunity to re-think SAP security and harden S/4HANA right from the outset. However, there are several challenges to SAP security with S/4HANA. Despite sharing numerous settings with the “old” SAP Business Suite, some things are fundamentally different in S/4HANA.
Category:
May 25, 2020
In the last major release 4.7, SecurityBridge introduced the Security & Compliance Manager. 4.71 contain first enhancement inspired by our early adopter community and many more features.
Category:
May 22, 2020
#sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
May 22, 2020
#sapsecurity
Being reactive is simply not enough. If threat actors didn’t innovate, security providers wouldn’t need to either. It’s hackers' ability to imagine new ways to hurt us, and then execute them at speed, that has left us trying to guess the next move.
Category:
May 22, 2020
#sapsecurity
Even though SAP systems run on regular operating systems and databases, the application itself uses very specific standards and formats for exchanging and storing data. This article explains the top reasons chief security officer's neglect SAP Security.
Category:
May 22, 2020
On 04.05.2020 / 23:19 CET/CEST SAP SE published an ad-hoc news informing their investors about a security shortcoming affecting some products of their cloud portfolio. On-Premise customers are not impacted. The company emphasizes that no cyber security incident was found.
Category:
Find recent Security Advisories for SAP©

You like it?
Share it!

Mastering NIST & CISA Compliance for SAP

Join us for an enlightening webinar where we simplify these regulatory frameworks, map CISA guidelines to SAP instances, and showcase how the SecurityBridge platform can assist you in achieving your SAP compliance needs.
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
Download the White Paper “Which cybersecurity framework is the best fit for SAP application security?” to learn more about the available frameworks, the challenges when adopting a framework, and more.