Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
        • Defend
        • Onapsis for SAP BTP
        • Control
        • Assess for SAP Success Factors
        • Security Advisor
        • Premium Add-Ons
      Request a demo
      Onapsis Webinar
      Webinars

      Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management

      WATCH NOW Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management
  • SolutionsExpand
      • Solutions
        • By Initiative
          • Accelerate SAP S/4HANA Transformations
          • Achieve Automated Compliance
          • Building Cyber Resilience for RISE with SAP
          • Incident Response
          • Secure SAP Cloud Migration & Operation
          • Strengthen DevSecOps
          • Strengthen SAP Security for NIS2 Compliance
          • Threat Detection & Response
          • Vulnerability Management
        • By Industry
          • Financial Services
          • Food & Beverage Manufacturing
          • Government
          • Healthcare
          • Heavy Manufacturing
          • Industrial Chemicals
          • Pharmaceuticals
          • Electric & Utilities
          • Oil & Gas
          • Personal Care Manufacturing
          • Retail Manufacturing
      Onapsis Webinar
      Webinars

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      WATCH NOW Securing Your Future: Preparing for a Successful SAP RISE Transformation
  • ResourcesExpand
      • Resources
        • Blog
        • Case Studies
        • Datasheets
        • eBooks
        • Infographics
        • Knowledge Articles
        • Podcasts
        • Publications
        • Security Advisories
        • Solution Briefs
        • Threat Reports
        • Videos
        • Webinars
        • White Papers
      Subscribe To Our Newsletter
      Datasheets

      Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer

      READ NOW Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer
  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
        • CVE-2025-31324 & CVE-2025-42999
        • CH4TTER
        • C2 Incident on SAP
        • P4CHAINS
        • ICMAD
        • RECON
        • 10KBLAZE
      Watch The Defenders Digest
      Onapsis Webinar
      Webinars

      Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)

      WATCH NOW Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)
  • CompanyExpand
      • Company
        • Partners
        • Giving Back
        • Leadership
        • Careers
        • Events
        • News & Press
        • Recognition
        • Contact Us
      Subscribe to Our Newsletter
      Solution Briefs

      10 Reasons Why More Companies Choose Onapsis

      READ MORE 10 Reasons Why More Companies Choose Onapsis
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • 5 Reasons Why You Need Application Security Testing for Business-Critical SAP Applications
    White Papers

    5 Reasons Why You Need Application Security Testing for Business-Critical SAP Applications

    Build security into the development process. Here are five reasons why you need application security testing (AST) capabilities specifically designed for your business-critical SAP applications.

    Read More 5 Reasons Why You Need Application Security Testing for Business-Critical SAP ApplicationsContinue

  • SAP Business Risk Illustration: Cyber Risk Assessment
    Solution Briefs

    SAP Business Risk Illustration: Cyber Risk Assessment

    40,000+ ORGANIZATIONS USING SAP ARE AT RISK OF RECON VULNERABILITY Successful Exploit Could Allow Unauthenticated Full System Access; Impact Business Operations and Regulatory Compliance

    Read More SAP Business Risk Illustration: Cyber Risk AssessmentContinue

  • Webinars

    Cyber Tech Talk Series – Transformation Takeaways: 4 Learnings From Industry Leaders

    Many organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.

    Read More Cyber Tech Talk Series – Transformation Takeaways: 4 Learnings From Industry LeadersContinue

  • Mariano Nunez
    Webinars

    How to Secure Your Business-Critical SAP Applications Against Modern Ransomware

    In this on-demand fireside chat, Richard Puckett, CISO of SAP, and Mariano Nuñez, CEO of Onapsis, talk about today’s sophisticated and dynamic ransomware attacks and the key actions, best practices and controls you should implement to mitigate your business’s risk.

    Read More How to Secure Your Business-Critical SAP Applications Against Modern RansomwareContinue

  • Webinars

    Utilities OG&E: Fireside Chat

    Hear from Oklahoma’s largest electric utility, Oklahoma Gas & Electric Company (OGE Energy Corp), on how they have approached their security holistically, taking familiar security best practices and implementing them at both the OT & IT level.

    Read More Utilities OG&E: Fireside ChatContinue

  • Mitigating the Threat of Ransomware to Business-Critical SAP Applications – White Paper
    White Papers

    Mitigating the Threat of Ransomware to Business-Critical SAP Applications – White Paper

    SAP and Onapsis share steps to protect business-critical SAP applications against modern ransomware attacks.

    Read More Mitigating the Threat of Ransomware to Business-Critical SAP Applications – White PaperContinue

  • Webinars

    4 Things to Consider as You Select a Vulnerability Management Provider

    Dig into implementation best practices and integration must-haves. We’ll review tips, tricks, and techniques to get the most from a vulnerability management program.

    Read More 4 Things to Consider as You Select a Vulnerability Management ProviderContinue

  • Webinars

    CIO Insights: 4 Focus Areas for 2022

    Better understand the executive- and board-level conversations happening around business-critical application security and program blind spots. What are your CIO peers focusing on in 2022? What can CISOs, infosec leaders, and application owners do to support the office of the CIO?

    Read More CIO Insights: 4 Focus Areas for 2022Continue

  • Webinars

    Q&A Session with SAP & Onapsis: Active Cyberattacks on Mission-Critical SAP Applications

    Listen to a Q&A session with Richard Puckett, CISO at SAP and Mariano Nunez, CEO at Onapsis to discuss the key findings and actions to take to immediately protect your business.

    Read More Q&A Session with SAP & Onapsis: Active Cyberattacks on Mission-Critical SAP ApplicationsContinue

Page navigation

Previous PagePrevious 1 … 30 31 32 33 34 … 42 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Solutions
    • Solutions Overview
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Industries Overview
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Resources
    • Resources Overview
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • Watch the Defenders Digest
  • Threat Research
    • Threat Research Overview
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
    • 10KBlaze
  • Company
    • Company Overview
    • Become a Partner
    • Giving Back
    • Leadership
    • Careers
    • Events
    • News & Press
    • Contact Us
    • Recognition
Customer Portal
Partner Portal

Contact Us