Skip to content

TRENDING TAGS

Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.

Countering Data Breaches – An Urgent Call for Action

Earlier this year, IBM presented its 18th edition of ‘The Cost of a Data Breach Report’ (you can find it here). This publication provides detailed and valuable insights into various factors related to data breaches. It is based on research carried out at 553 impacted organizations - any IT security professional should check it out. In this article, we will highlight some of this report’s findings and bring them into the context of SAP security.

How can AI help improve your SAP Security posture?

This blog explores AI's role in SAP Security, security platform challenges and the need for system hardening.

SecurityBridge Research Lab reported over 100 SAP cybersecurity vulnerabilities 

This article highlights SecurityBridge Research Lab's discovery of 100+ zero-day vulnerabilities in SAP software, enhancing SAP security.

SAP Security Patch Day – November 2023

SAP has released another set of Security Patches on this SAP Security Patch Day for November. Like last month, the number of patches is relatively low, with only 3 new Security Notes and 3 updates to notes that have been earlier released.

Security Breaches Not Only Affect Large Organisations

In this blog, we highlight the vulnerability of small and medium-sized businesses’ SAP systems to cyber-attacks.

Practical Exploitation of SAP Vulnerability CVE-2021-44231

In this blog, we talk about the practical exploitation of SAP vulnerability CVE-2021-44231 and provide a solution to address it.

Reverse Invoke for Added Security: SAP Web Dispatcher as an example

In this blog, we highlight reverse invoke for added security by taking an SAP Web Dispatcher to SAP backend scenario as an example.

SAP BTP Security: A Top Priority for 2024

Organizations should proactively acknowledge the presence of zero-day vulnerabilities and anticipate their exploitation. Choosing a proactive approach, rather than merely reacting to situations, helps prevent chaotic responses to critical security incidents and promotes organized handling of such events. Organizations need to target a long-lasting and sustainable security posture that is resilient against currently unknown vulnerabilities.

How do you prevent the SAP attack surface from outgrowing control?

Organizations should proactively acknowledge the presence of zero-day vulnerabilities and anticipate their exploitation. Choosing a proactive approach, rather than merely reacting to situations, helps prevent chaotic responses to critical security incidents and promotes organized handling of such events. Organizations need to target a long-lasting and sustainable security posture that is resilient against currently unknown vulnerabilities.

Why is User and Entity Behavior Analytics for SAP a new approach?

UEBA is a technology that analyzes the behavior patterns of users and entities, like IT-systems or applications, in an organization's network and detects anomalies or deviations from the normal baselines.

Latest Resources

How SecurityBridge Supports NIST CSF in SAP Environments

Download the White Paper "Bridging the Gap - How SecurityBridge Supports NIST CSF in SAP Environments". Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.

Which cybersecurity framework is the best fit for SAP application security?

Download the White Paper "Which cybersecurity framework is the best fit for SAP application security?" to learn more about the available frameworks, the challenges when adopting a framework, and more.

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

Remote work is posing new challenges to companies' SAP security posture. In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.