Skip to content

TRENDING TAGS

Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.

How poor management lets the cybersecurity ball get dropped

Firstly: I’m not a techie, I’m a marketing guy. So, what qualifies me to write a blog article about SAP cybersecurity? Well nothing really except that sometimes an unbiased view on things is helpful. Here’s what I mean…

What DevSecOps can look like for SAP

Organizations struggle with the fact that their SAP systems are hardly understood by the information security department team members. Read why DevSecOps for SAP could introduce a new approach with a more promising efficiency.

SAP Security Update Implementation and Deployment

Applying security updates is a very effective protection against successful cyberattacks. Continue reading to learn more about security patch deployment.

Demystify ransomware in the context of SAP

To demystify ransomware in the context of SAP we need to look at the attack scenario. While traditional ransomware hits the victim on the operating system level, the SAP technology stack is only impacted if the server platform was successfully attacked.

Efficient Patch Management for SAP

Applying security updates is a very effective protection against successful cyberattacks. Unfortunately, SAP patching is essential but time-consuming, and keeping a system unpatched is like sending an open invitation to threat actors.

Latest Resources

How SecurityBridge Supports NIST CSF in SAP Environments

Download the White Paper "Bridging the Gap - How SecurityBridge Supports NIST CSF in SAP Environments". Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.

Which cybersecurity framework is the best fit for SAP application security?

Download the White Paper "Which cybersecurity framework is the best fit for SAP application security?" to learn more about the available frameworks, the challenges when adopting a framework, and more.

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

Remote work is posing new challenges to companies' SAP security posture. In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.