When Onapsis was founded 10 years ago, very few people knew about or were discussing the importance of business application cybersecurity. Mission-critical applications form the core of your business, and if not properly secured, you are putting your entire organization at risk of cyberattack, financial fraud or falling out of compliance. From humble beginnings in a garage in Argentina, Onapsis CEO Mariano Nunez has brought to light the value and necessity behind keeping your mission-critical applications safe. Watch the video below to learn more about the history of Onapsis and the changes in business application cybersecurity over the years.

About the Author
Virginia Satrom Peterson is a strategic leader in the cybersecurity space, specializing in the intersection of business-critical application security and digital transformation. At Onapsis, she focuses on translating complex SAP threat intelligence into actionable insights for enterprise leaders. By bridging the gap between technical security operations and business stakeholders, Virginia helps organizations understand the urgency of protecting their core ERP landscapes from evolving cyber threats.
More about this author
Further Reading
How to Build an SAP Threat Intelligence Program in 2026
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
Implementing SAP Security Baseline v2.6 with Onapsis
With the myriad amount of technology that is utilized within an enterprise it can be a challenge for even seasoned cyber security professionals to be aware of all the technology in use, let alone understand how best to ensure the technology is secured in line with the enterprise’s requirements. Mature providers of critical business applications…
Research Discovery: Identification of CVE-2025-42937 (SAPSprint RCE)
Onapsis Research Labs has identified a remotely exploitable path traversal vulnerability within the SAP Print Protocol. This protocol, used to send print requests to the SAPSprint service, fails to properly sanitize one path. The exploit, which requires no authentication, and operating by default on target port 515, allows an attacker to upload arbitrary files to…

