Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

January 12, 2022
#patch, #sapsecurity
What is a Supply chain attack vulnerability using the SAP Transport Management System? SAP transport content can be adjusted after being exported and passing through test deployment and QA processes. Learn why it is crucial to protect your SAP digital backbone.
Category:
January 12, 2022
#patch, #sapsecurity
Supply chain attacks are a new type of threat that targets software development departments and vendors. SecurityBridge has now identified a methodology that allows internal attackers without privileged rights to intervene undetected in the SAP soft-ware distribution process.
Category:
December 15, 2021
#log4j, #sapsecurity
Stay tuned and read regular updates on the Log4j zero day vulnerability - how it can affect your SAP systems, and what you can do to protect your IT infrastructure
Category:
December 15, 2021
#log4j, #patch, #sapsecurity
The Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution (RCE) vulnerability. An attacker can leverage this vulnerability to take full control of a targeted machine.
Category:
December 14, 2021
#patch, #sapsecurity
Today, for the last time in 2021, SAP releases it’s monthly security updates, in the course of SAP Security Patch Day. Currently, the IT world is in turmoil as various information security authorities have drawn attention to a widespread vulnerability called log4j earlier this week.
Category:
December 10, 2021
#sapsecurity
Over the past months, I've spent a lot of time talking to customers and prospects to better understand their requirements, challenges and motivations. In these conversations, one question has been frequently asked: "What's the best way to move forward in SAP security after the initial security analysis?"
Category:
December 7, 2021
#ransomware, #sapsecurity
Ransomware is the bugbear of IT security departments these days. SAP has only been affected to a limited extent so far, but it can certainly be abused as a gateway. SAP applications therefore need holistic protection, recommends SecurityBridge, provider of cybersecurity for SAP applications.
Category:
November 25, 2021
#partner, #sapsecurity
How can mid-market companies whose budgets can’t cater for a cybersecurity solution still protect their SAP from cyber attacks? Well, enter the perks of the as-a-service-economy. These businesses now have access to cybersecurity-as-a-service.
Category:
Find recent Security Advisories for SAP©

You like it?
Share it!

Share on linkedin
Share on twitter
Share on whatsapp
Share on email

2nd CROSSTHEBRIDGE
Cycling event

Join our cycling community on September 9th in Brabant (NL), get a SecurityBridge cycling shirt and enjoy a wonderful day.
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.