Skip to content

A recap of our 3rd #CrossTheBridge cycling...

On September 8th, 2023, we hosted the 3rd edition of our #CrossTheBridge Cycling Event. This annual gathering brought together our valued partners and customers, for a day packed with adventure, celebration, networking and, importantly, the sharing of SAP cybersecurity knowledge and insights.

Read More

Practical Exploitation of SAP Vulnerability CVE-2021-44231...

In this blog, we talk about the practical exploitation of SAP vulnerability CVE-2021-44231 and provide a solution to address it.

Read More

Reverse Invoke for Added Security: SAP Web...

In this blog, we highlight reverse invoke for added security by taking an SAP Web Dispatcher to SAP backend scenario as an example.

Read More

SAP BTP Security: A Top Priority for...

Organizations should proactively acknowledge the presence of zero-day vulnerabilities and anticipate their exploitation. Choosing a proactive approach, rather than merely reacting to situations, helps prevent chaotic responses to critical security incidents and promotes organized handling of such events. Organizations need to target a long-lasting and sustainable security posture that is resilient against currently unknown vulnerabilities.

Read More

Senior SAP Developer (ABAP/4 and SAPUI5 Fiori)...

As a Senior SAP Developer, you will be responsible for designing, developing, and maintaining SAP solutions while leading and guiding a team of developers. You will play a crucial role in the development of standard products, and your technical expertise and communication skills will be instrumental in ensuring the success of our projects. This role demands strong leadership, technical acumen, and the ability to collaborate effectively in an international development team.

Read More

How do you prevent the SAP attack...

Organizations should proactively acknowledge the presence of zero-day vulnerabilities and anticipate their exploitation. Choosing a proactive approach, rather than merely reacting to situations, helps prevent chaotic responses to critical security incidents and promotes organized handling of such events. Organizations need to target a long-lasting and sustainable security posture that is resilient against currently unknown vulnerabilities.

Read More

Why is User and Entity Behavior Analytics...

UEBA is a technology that analyzes the behavior patterns of users and entities, like IT-systems or applications, in an organization’s network and detects anomalies or deviations from the normal baselines.

Read More

Security Automation: The Need for a Last...

Join our upcoming webinar session on Security Automation with special guests from SecurityBridge and discover how you can automate your SAP security and compliance processes to improve your security posture and implement a last line of defence for your mission-critical SAP landscape.

Read More

PASàPAS schützt SAP-Systeme seiner Kunden mit SecurityBridge...

Der Managed Service Provider PASàPAS, französisches Unternehmen der Talan-Gruppe mit weltweitem Kundenstamm, unterstützt kleine und mittlere Unternehmen bei der Entwicklung von SAP-Systemen und Umstellung auf S/4HANA.

Read More