Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
        • Defend
        • Onapsis for SAP BTP
        • Control
        • Assess for SAP Success Factors
        • Security Advisor
        • Premium Add-Ons
      Request a demo
      Onapsis Webinar
      Webinars

      Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management

      WATCH NOW Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management
  • SolutionsExpand
      • Solutions
        • By Initiative
          • Accelerate SAP S/4HANA Transformations
          • Achieve Automated Compliance
          • Building Cyber Resilience for RISE with SAP
          • Incident Response
          • Secure SAP Cloud Migration & Operation
          • Strengthen DevSecOps
          • Strengthen SAP Security for NIS2 Compliance
          • Threat Detection & Response
          • Vulnerability Management
        • By Industry
          • Financial Services
          • Food & Beverage Manufacturing
          • Government
          • Healthcare
          • Heavy Manufacturing
          • Industrial Chemicals
          • Pharmaceuticals
          • Electric & Utilities
          • Oil & Gas
          • Personal Care Manufacturing
          • Retail Manufacturing
      Onapsis Webinar
      Webinars

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      WATCH NOW Securing Your Future: Preparing for a Successful SAP RISE Transformation
  • ResourcesExpand
      • Resources
        • Blog
        • Case Studies
        • Datasheets
        • eBooks
        • Infographics
        • Knowledge Articles
        • Podcasts
        • Publications
        • Security Advisories
        • Solution Briefs
        • Threat Reports
        • Videos
        • Webinars
        • White Papers
      Subscribe To Our Newsletter
      Datasheets

      Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer

      READ NOW Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer
  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
        • CVE-2025-31324 & CVE-2025-42999
        • CH4TTER
        • C2 Incident on SAP
        • P4CHAINS
        • ICMAD
        • RECON
        • 10KBLAZE
      Watch The Defenders Digest
      Onapsis Webinar
      Webinars

      Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)

      WATCH NOW Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)
  • CompanyExpand
      • Company
        • Partners
        • Giving Back
        • Leadership
        • Careers
        • Events
        • News & Press
        • Recognition
        • Contact Us
      Subscribe to Our Newsletter
      Solution Briefs

      10 Reasons Why More Companies Choose Onapsis

      READ MORE 10 Reasons Why More Companies Choose Onapsis
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Cybersecurity Experts Discuss How Businesses are Protecting Themselves to Remain Cyber Resilient
    Videos

    Cybersecurity Experts Discuss How Businesses are Protecting Themselves to Remain Cyber Resilient

    Hear from Khaja Ahmed, Head of Global Product and Application Security at SAP, and Onapsis General Manager of Product and Technology, Anshuman Kanwar, discuss the challenges and strategies companies have for protecting their mission-critical applications to maintain business success.

    Read More Cybersecurity Experts Discuss How Businesses are Protecting Themselves to Remain Cyber ResilientContinue

  • SAP Transport Inspection
    Solution Briefs

    SAP Transport Inspection

    Avoid import errors, business outages, downgrades, security vulnerabilities and compliance violations by inspecting all transports before import. Learn how Onapsis can help.

    Read More SAP Transport InspectionContinue

  • SAP Custom Code Analysis
    Solution Briefs

    SAP Custom Code Analysis

    Find quality, security and compliance issues in ABAP, SAPUI5 (FIORI), XSJS and SQLSCRIPT. Learn how Onapsis can help.

    Read More SAP Custom Code AnalysisContinue

  • Critical Controls for SAP Implementation
    White Papers

    Critical Controls for SAP Implementation

    A two part implementation document to help organizations securely migrate to and operate ERP applications in the cloud

    Read More Critical Controls for SAP ImplementationContinue

  • Working with Onapsis to Strategically Move to the Cloud
    Videos

    Working with Onapsis to Strategically Move to the Cloud

    Hear from Preston Futrell, leader of the Global Business Services organization at IBM, as he discusses how they help customers develop their SAP implementations as they migrate to the cloud and how working with Onapsis enables them to assure that security is included.

    Read More Working with Onapsis to Strategically Move to the CloudContinue

  • Internal Control Over Financial Reporting (ICFR)
    Solution Briefs

    Internal Control Over Financial Reporting (ICFR)

    An unauthenticated attack targeting a misconfiguration or vulnerability in your mission-critical applications could let hackers manipulate underlying financial data without touching financial applications or leaving an audit trail, violating ICFR and SOX.

    Read More Internal Control Over Financial Reporting (ICFR)Continue

  • Defense Federal Acquisition Regulation Supplement (DFARS)
    Solution Briefs

    Defense Federal Acquisition Regulation Supplement (DFARS)

    An unauthenticated attack exploiting a misconfiguration or vulnerability in your mission-critical applications, which many organizations use to manage supply chains with their partners, could allow malicious actors to manipulate underlying data without touching user applications or leaving an audit trail, violating DFARS.

    Read More Defense Federal Acquisition Regulation Supplement (DFARS)Continue

  • EU General Data Protection Act (GDPR)
    Solution Briefs

    EU General Data Protection Act (GDPR)

    The EU GDPR regulation requires companies to protect any personal data that is stored in their systems, from both theft and manipulation. Hackers could target a misconfiguration or vulnerability in the company’s mission-critical applications, and gain access to this data without using business applications or leaving an audit trail, violating GDPR.

    Read More EU General Data Protection Act (GDPR)Continue

  • Foreign Corrupt Practices Act (FCPA)
    Solution Briefs

    Foreign Corrupt Practices Act (FCPA)

    Strong cybersecurity thwarts the manipulation of transactions used to disguise illicit payments and other actions that can compromise compliance. Read how cybersecurity plays a role in avoiding the violation of the Foreign Corrupt Practices Act and preventive steps your organization can take.

    Read More Foreign Corrupt Practices Act (FCPA)Continue

Page navigation

Previous PagePrevious 1 … 31 32 33 34 35 … 41 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Solutions
    • Solutions Overview
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Industries Overview
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Resources
    • Resources Overview
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • Watch the Defenders Digest
  • Threat Research
    • Threat Research Overview
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
    • 10KBlaze
  • Company
    • Company Overview
    • Become a Partner
    • Giving Back
    • Leadership
    • Careers
    • Events
    • News & Press
    • Contact Us
    • Recognition
Customer Portal
Partner Portal

Contact Us