Back To Resources

Resources

Upcoming Live Webinars
Onapsis Webinar

Log4j Vulnerability: Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

SAP and Onapsis share steps to protect business-critical SAP applications and improve SAP security to mitigate the threat of the Log4j vulnerability to the log4shell exploits.

Critical ICMAD Vulnerabilities: Who Is at Risk & How to Protect Your Business-Critical SAP Applications

Who Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.

ICMAD Report

The ICMAD Vulnerabilities: Who Is at Risk and How to Protect Your Business-Critical SAP Applications

Onapsis Research Labs’ thorough investigation of HTTP Response Smuggling over the last year led to the recent identification of the ICMAD vulnerabilities. Read the threat report from Onapsis Research Labs to understand: Onapsis worked closely with SAP’s Product Security Response Team to discover and patch these critical vulnerabilities. Both companies believe that all unpatched SAP applications…

5 Reasons Why You Need Application Security Testing for Business-Critical SAP Applications

Build security into the development process. Here are five reasons why you need application security testing (AST) capabilities specifically designed for your business-critical SAP applications.

SAP Business Risk Illustration: Cyber Risk Assessment

40,000+ ORGANIZATIONS USING SAP ARE AT RISK OF RECON VULNERABILITY Successful Exploit Could Allow Unauthenticated Full System Access; Impact Business Operations and Regulatory Compliance

Resource Placeholder

Cyber Tech Talk Series – Transformation Takeaways: 4 Learnings From Industry Leaders

Many organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.

Mariano Nunez

How to Secure Your Business-Critical SAP Applications Against Modern Ransomware

In this on-demand fireside chat, Richard Puckett, CISO of SAP, and Mariano Nuñez, CEO of Onapsis, talk about today’s sophisticated and dynamic ransomware attacks and the key actions, best practices and controls you should implement to mitigate your business’s risk.

Resource Placeholder

Utilities OG&E: Fireside Chat

Hear from Oklahoma’s largest electric utility, Oklahoma Gas & Electric Company (OGE Energy Corp), on how they have approached their security holistically, taking familiar security best practices and implementing them at both the OT & IT level.

Mitigating the Threat of Ransomware to Business-Critical SAP Applications – White Paper

SAP and Onapsis share steps to protect business-critical SAP applications against modern ransomware attacks.

Page 22 of 32