As the Vice President of Business Application Cybersecurity at Onapsis, Jason Frugé is passionate about securing your mission-critical applications. As a Texas resident, however, Jason is also passionate about cigars, bourbon and BBQ!
Earlier this year, we launched our popular Frugé-ology video series on our social channels, where Jason shares his cybersecurity experience as a former CISO and also shows off his smoked meat skills and whiskey knowledge. To bring all our episodes to one place, we are excited to announce the launch of our Frugé-ology video page, where you can find all Jason’s videos in one spot! Be sure to bookmark this page for regular Frugé-ology updates.
If you haven’t caught up on our LinkedIn happenings, now is the time to give us a follow!

About the Author
Virginia Satrom Peterson is a strategic leader in the cybersecurity space, specializing in the intersection of business-critical application security and digital transformation. At Onapsis, she focuses on translating complex SAP threat intelligence into actionable insights for enterprise leaders. By bridging the gap between technical security operations and business stakeholders, Virginia helps organizations understand the urgency of protecting their core ERP landscapes from evolving cyber threats.
More about this author
Further Reading
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
The #1 Roadblock to RISE with SAP Success: A Secure-by-Design Guide
The #1 roadblock to a successful RISE with SAP transformation is failing to address security as a core part of the project. RISE with SAP is a “Business Transformation as a Service” (BTaaS) offering, but organizations that treat it as a simple technical migration without embedding security are at high risk. Research shows 70% of…
