The importance of security behind digital transformations has never been more relevant. Digital transformation is not only changing all of your business processes, but also moving all your security business systems to the cloud. These kinds of transitions can cause a lot of security risk, requiring a lot of trust on the end of the organization, but also the ability to verify that the processes and systems are still safe and secure. Over 64% of ERP deployments experienced some form of breach in the last 24 months—don’t let your organization become one of them. Listen to Steve Zalewski, Deputy CISO of Levi’s Strauss & Co., discuss digital transformation, security and risk and how Onapsis gave them much-needed visibility in the video below.

About the Author
As CEO and Co-Founder of Onapsis, Mariano drives the strategic direction of the company. Under his leadership, Onapsis has become one of the fastest-growing technology and cybersecurity companies in the world. With 20+ years of experience in the cybersecurity industry, both as an executive and as a cyber security expert, Mariano was the first to publicly present on cybersecurity risks affecting ERP platforms and how to mitigate them at major conferences such as RSA, Black Hat and SANS. Mariano’s contributions to the cybersecurity community include developing the first open-source SAP and ERP Penetration Testing frameworks, and uncovering critical zero-day vulnerabilities in SAP, Oracle, IBM, and Microsoft applications. Mariano’s insights are regularly featured in major media outlets such as CNN, Reuters, Wall Street Journal, Nasdaq, Fortune and The New York Times.
More about this author
Further Reading
How to Build an SAP Threat Intelligence Program in 2026
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
Implementing SAP Security Baseline v2.6 with Onapsis
With the myriad amount of technology that is utilized within an enterprise it can be a challenge for even seasoned cyber security professionals to be aware of all the technology in use, let alone understand how best to ensure the technology is secured in line with the enterprise’s requirements. Mature providers of critical business applications…
Research Discovery: Identification of CVE-2025-42937 (SAPSprint RCE)
Onapsis Research Labs has identified a remotely exploitable path traversal vulnerability within the SAP Print Protocol. This protocol, used to send print requests to the SAPSprint service, fails to properly sanitize one path. The exploit, which requires no authentication, and operating by default on target port 515, allows an attacker to upload arbitrary files to…
