When Onapsis was founded 10 years ago, very few people knew about or were discussing the importance of business application cybersecurity. Mission-critical applications form the core of your business, and if not properly secured, you are putting your entire organization at risk of cyberattack, financial fraud or falling out of compliance. From humble beginnings in a garage in Argentina, Onapsis CEO Mariano Nunez has brought to light the value and necessity behind keeping your mission-critical applications safe. Watch the video below to learn more about the history of Onapsis and the changes in business application cybersecurity over the years.

About the Author
Virginia Satrom Peterson is a strategic leader in the cybersecurity space, specializing in the intersection of business-critical application security and digital transformation. At Onapsis, she focuses on translating complex SAP threat intelligence into actionable insights for enterprise leaders. By bridging the gap between technical security operations and business stakeholders, Virginia helps organizations understand the urgency of protecting their core ERP landscapes from evolving cyber threats.
More about this author
Further Reading
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
The #1 Roadblock to RISE with SAP Success: A Secure-by-Design Guide
The #1 roadblock to a successful RISE with SAP transformation is failing to address security as a core part of the project. RISE with SAP is a “Business Transformation as a Service” (BTaaS) offering, but organizations that treat it as a simple technical migration without embedding security are at high risk. Research shows 70% of…

