Home /
Latest News..
- Careers
- Download assets
- Events
- Life at SecurityBridge
- Partner News
- Press coverage
- Product Feature
- Release highlights
- SAP Cloud Security
- SAP Code Security
- SAP Cybersecurity
- SAP Identity and Authorization
- SAP Interface
- SAP Patch Management
- SAP Security Automation
- SAP Security Framework
- SAP Security Logs
- SAP Security Patch Day
- SAP Threat Monitoring
- SAP Vulnerability
- Security News
- Uncategorized
Virtual patching – especially attractive to SAP...
SAP systems belong to the companies’ critical infrastructures, no doubt. Yet, enterprises struggle with the timely implementation of patches. Within this article, we provide a deep-dive into the challenges that let you remember how patching SAP NetWeaver application works.
Read MoreWhy CISA strongly recommends monitoring SAP?...
The Cybersecurity and Infrastructure Security Agency (CISA) strongly recommends organizations immediately apply patches, and in situations where patches cannot be applied, CISA recommends “closely monitoring your SAP NetWeaver AS for anomalous activity”.
Read MoreThe week after SAP RECON [CVE-2020-6287]...
SAP Patch Day July 2020 shocked the customer community of SAP SE. Although everyone assumed that zero-days with a high-risk potential of exploitation exist, the recent Patch Day has delivered evidence. Read more to understand what you should do as the next best action to protect your enterprise.
Read MoreSAP Security Patch Day – July 2020...
We are rapidly approaching summer vacation. Despite the holiday season the SAP Security Response team remains very active also with this months patchday. Today, the 14th of July 2020, 7 new patches and 2 updates to existing patches have been released.
Read More2FA for SAP, and how to hack...
Gear up your SAP Logon process using 2 factor authentification. 2FA, typically demands two components to co-exist, in the same place, at the time of login. In practice, this typically means the end-user has a physical device such as a SmartCard, and a memorized PIN number.
Read MoreEnsuring SAP compliance...
In information technology, compliance and security are inseparable. For SAP systems, this relatively simple relationship between compliance and security becomes a little bit more complicated, read more to learn about the reasons.
Read More3 Benefits of an integrated and holistic...
Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.
Read MoreTop mistakes to avoid in SAP security...
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.
Read MoreGet a grip on SAP Interface Security...
Latest addition to the SecurityBridge suite is a fully integrated interface monitor, which visualizes RFC interface connectivity across your SAP landscape. Through a bird’s eye view security critical traffic and vulnerable interfaces can easily be spotted.
Read More