TRENDING TAGS

Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.

#crossthebridge Cycling 2021

On September 3, 2021 SecurityBridge celebrated the successful premiere of the crossthebridge cycling event in the Netherlands. Together with customers and partners we were cycling for SAP security, a good cause, and for fun.

Interview: Steen Schledermann NTT DATA

Applying security updates is a very effective protection against successful cyberattacks. Continue reading to learn more about security patch deployment.

CROSSTHEBRIDGE Cycling event – September 2021

Join our cycling community on September 3rd in Arnheim (NL), get one of our cycling jerseys, and support the Maartens Foundation.

PASàPAS and SecurityBridge form Partnership

Ingolstadt 28th June 2021. SecurityBridge has announced a strategic partnership with regional value-added reseller PASàPAS, located in France.

SecurityBridge and AGENTIL Group form Partnership

January 2021, SecurityBridge, and SAP IT security specialist, AGENTIL Group announced a partnership, to provide an integrated SAP Security Platform and services.

ABEX becomes SecurityBridge

Ingolstadt, Germany: December 2020, ABEX, today announced to rebrand into SecurityBridge.

SecurityBridge hires Jaap van der Meer as Sales Director

We are delighted to announce the addition to our team of Jaap van der Meer as Director of Sales, based in The Netherlands.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.