TRENDING TAGS

Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.

Threat Intelligence in the context of SAP

SecurityBridge, the only holistic security platform for SAP systems, offers the two key factors necessary for Threat Intelligence in an SAP context: For the identification and elimination of vulnerabilities, a comprehensive catalog of tests is integral part of SecurityBridge, based on established standards.

Why Branden Newman joins the ABEX Advisory Board

ABEX recently announced the appointment of Branden Newman to it's Board of Advisors. In his video here, he is giving insight into his motivation and common mistakes that he has identified as the enemy of SAP security and IT operations.

Hyperlogging – to boldly go where no one has gone before

HyperLogging introduces a new capability for SAP endpoints. Once enabled is collects all relevant data sources which are relevant for forensic analysis of incidents.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report 2019

Download the SAP Security Product Comparison Report (2019) and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.