Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.
On Sept. 6, director Kelly Richmond Pope will discuss a case in which a small town official stole $53 million in public funds over two decades to illustrate the importance of managing insider threats.
There's a growing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy.
According to a new report, threat actors are targeting enterprise resource planning (ERP) applications like SAP — and, in some cases, are exploiting a vulnerability that was disclosed in 2016.
IBM Security Services and ERP Maestro: Teaming Up to Effectively Address SAP User Access Security Risks
Organizations often struggle with SAP Access risks. A new partnership between IBM Security and ERP Maestro can help tackle these challenges.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
Like the Na'vi guarded their "Tree of Souls," the Onapsis Security Platform delivers the insights IT analysts need to protect their SAP systems.