Protecting critical data from interconnected risk was SAP’s main motivation for introducing Read Access Logging (RAL). Learn how to use RAL to detect and analyze fraud or data theft to ensure SAP security.
SAP
Why Now Is the Time to Protect Your Business-Critical SAP Applications
Now is the time to secure your business-critical SAP applications.
Learn from the Business-Critical Application Security Experts at Black Hat USA 2021
Meet Onapsis at Black Hat 2021 for a training session on a complete approach for both Offensive and Defensive of SAP systems.
Cyber Criminals Are Targeting ERP, CRM, and Other Core Business Systems. Are You Ready?
According to threat intelligence issued by SAP and Onapsis, there’s a critical cybersecurity blind spot impacting how many organizations protect their mission-critical SAP applications. At the same time, it’s clear that threat actors are active, capable, and widespread.
Busting 3 Common Myths Around SAP Security
Let’s take a look at some of the top myths around SAP security and use these insights to help make better decisions to keep your organization secure.
Q&A: Active Cyberattacks on Mission-Critical SAP Applications
During our recent webinar covering our threat report, we received a lot of great questions from attendees. In this post, we are going to address some of the questions that were asked in the live session.
SAP Security Patch Day March 2021: Critical Patch Released for SAP MII and SAP NetWeaver AS Java
SAP has released 18 new and updated SAP Security Notes in its March 2021 patch release, including the notes that were released since last patch day. As part of this month’s patch release, there are four HotNews notes and one High Priority note.
SAP Security Patch Day February 2021: Critical Patch released for SAP Commerce
SAP has released 20 new and updated SAP Security Notes on February’s Patch Day, including the notes that were released since last Patch Day.
Transaction Types and How to Automate SAP User Information System (SUIM) Queries with The Onapsis Platform
The SAP Security Admin utilizes SUIM in SAP systems manually, one SAP system/client at a time to gather this data for operational use and to report findings internally/externally to Compliance or Audit teams. This can be a time-consuming process.
Why the RECON Vulnerability Is a Before and After for SAP Cybersecurity Introduction
Anywhere from 2,500 up to potentially 10,000 internet-facing systems were exposed to RECON at the date of the release of the patch. Considering those numbers and that approximately 30% to 40% of the systems could still be vulnerable (based on estimations of diverse samples), that provides an enormous attack surface and risk. Learn more in our blog post here.
Categories
The Defenders Digest
Onapsis CTO and Director of Threat Research monthly video recap all things ERP security.
Watch Now