Skip to content

SecurityBridge Expands U.S. Partnerships With Taciti Consulting...

SecurityBridge Expands U.S. Partnerships With Taciti Consulting Alliance.
Combined Efforts Streamline SAP S/4HANA Transformations and Secure SAP Ecosystem

Read More

Taking the Taboo out of S_TABU Authorization...

SAP Authorization Objects for SAP NetWeaver AS ABAP technologies are not just blockers. They are the ENABLER of access.

Read More

5 Steps for Kick-starting Holistic SAP Security...

SAP Security teams can kick-start a comprehensive security platform and gain significant improvements already within a day. What they need is a holistic platform and a guided approach to SAP Security.

Read More

SAP Vulnerability Management vs SAP Patch Management...

This article explores the differences between the 2 processes and how they can help bolster the security of SAP systems.

Read More

SAP Security Patch Day – April 2024...

For April 2024, 10 new Security Notes have been released and 2 have been updated. What stands out is that there are no ‘Hot News’ notes in this release. But let that not be a reason to ‘lower your guard’! We explore some interesting highlights below.

Read More

The ‘Rapid Reset Attack’ – an SAP...

Recently, we have seen the release of several SAP Security notes that address the so-called ‘Rapid Reset Attack’ vulnerability. In this blog, we will zoom in on this vulnerability, look at how it affects SAP systems, and what counter measures can be taken.

Read More

Kontron setzt im Bereich SAP-Sicherheit auf SecurityBridge...

Kontron und SecurityBridge schließen eine strategische Partnerschaft für eine verbesserte IT-Sicherheit von SAP-Systemen ab.

Read More

SecurityBridge Unveils Platform Version 6.26: A Singular...

SecurityBridge Unveils Platform Version 6.26: A Singular Solution For SAP Security Across On-Prem And Cloud. This latest addition introduces a suite of advanced features to fortify SAP environments and address global enterprises’ evolving security needs.

Read More

Complete Compromise of an SAP System...

This article highlights the importance of securing the 3 layers of an SAP system to prevent unauthorized access to critical business data.

Read More

NIST CSF 2.0: A Winning Framework for...

Let’s be brutally honest: No one really cares about Vulnerability Management… Until they are impacted by a vulnerability exploit! We are always personally affected when an exploit negatively influences our finances, our privacy, our jobs, our careers, or even the size of our future paychecks.

Read More

SAP Security Patch Day – March 2024...

For March 2024, 10 new Security Notes have been released and 2 have been updated. Let’s look at some highlights, starting with the ‘HotNews’ notes.

Read More

Prerequisites for an AI-driven SAP Security –...

With the evolving success of AI, SAP customers want to understand more about the potential of AI to improve their SAP Security posture. However, some homework needs to be done to unleash the full potential of AI for protecting SAP environments. In the previous parts of this series of articles, we have already discussed two prerequisites for AI-driven SAP Security: system patching and hardening. In this article, we will look at vulnerabilities in the ABAP custom code.

Read More

SecurityBridge Attends SAPinsider 2024 To Discuss SAP...

SecurityBridge, a leading global provider of SAP security
solutions, today announced the company has teamed up with Lonza to discuss methods for SAP
cybersecurity protection at SAPinsider 2024, Las Vegas, March 18-21, 2024.

Read More

Reverse Invoke for Added Security: SAProuter as...

This article demostrates the underutilized security benefits of SAProuter’s reverse invoke configuration through a test setup.

Read More

Details about SAP vulnerability CVE-2022-22536 – Request...

In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher”. This particular type of vulnerability is not common in SAP systems and therefore interesting to look at. As patching the SAP kernel executables is often not done promptly, we can expect this vulnerability present in the customer’s systems for quite some time.

Read More