Happy Thanksgiving from all of us at Onapsis! While your Thanksgiving may look a little different this year, Onapsis Vice President of Business Application Cybersecurity, Jason Fruge, is here to make sure you still have the tastiest turkey on the block. In this episode of Frugé-ology, watch below as Jason Fruge shows how to cook the best turkey, and learn about our Onapsis Cares program that gives back to our communities. The Onapsis Cares program allows us to go further to give back to those in need. It is our hope and goal to inspire those around us to help us make an impact, “One Act of Kindness at a Time”.
In the spirit of the season, Onapsis will be donating $1 this Thanksgiving to local food banks for every download of Jason’s recipe here. Help us reach our $40,000 annual goal!
DOWNLOAD NOW

About the Author
As CEO and Co-Founder of Onapsis, Mariano drives the strategic direction of the company. Under his leadership, Onapsis has become one of the fastest-growing technology and cybersecurity companies in the world. With 20+ years of experience in the cybersecurity industry, both as an executive and as a cyber security expert, Mariano was the first to publicly present on cybersecurity risks affecting ERP platforms and how to mitigate them at major conferences such as RSA, Black Hat and SANS. Mariano’s contributions to the cybersecurity community include developing the first open-source SAP and ERP Penetration Testing frameworks, and uncovering critical zero-day vulnerabilities in SAP, Oracle, IBM, and Microsoft applications. Mariano’s insights are regularly featured in major media outlets such as CNN, Reuters, Wall Street Journal, Nasdaq, Fortune and The New York Times.
More about this author
Further Reading
How to Execute an SAP Incident Response Strategy: The Step-by-Step Playbook
Most Security Operations Centers (SOCs) operate with a dangerous blind spot. While they have mature playbooks for isolating infected endpoints or blocking malicious IPs at the firewall, they often lack a specific protocol for the organization’s most critical asset: the ERP system. This gap is existential. You cannot simply “pull the plug” on a production…
The Dangers of AI in Custom Code: How to Secure Your SAP Landscape
The evolution of AI has revolutionized the velocity of modern software development bringing unprecedented efficiencies. But at the same time, it introduces new security and compliance risks to your custom code that can be catastrophic if left unaddressed. The era of slow, manual code review is over. To survive the sheer volume of AI-generated content,…
How to Build an SAP Threat Intelligence Program in 2026
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
