Everything you need to know in the world of ERP security with The Defenders Digest. Hear directly from Paul Laudanski & JP Perez-Etchegoyen of Onapsis Research Labs as they chat through monthly highlights and need-to-know information around SAP and Oracle security.
Everything you need to know in the world of ERP security with The Defenders Digest. Hear directly from Paul Laudanski & JP Perez-Etchegoyen of Onapsis Research Labs as they chat through monthly highlights and need-to-know information around SAP and Oracle security.
Over the past few years, the threat landscape around SAP applications has evolved significantly. What has driven this change? Threat actors are increasingly seeing the profit derived from SAP applications, associated data they hold, and taking advantage of vulnerabilities. Pulling from Onapsis’ expertise in SAP cybersecurity and Flashpoint’s depth of threat intelligence, this webinar covers:
This presentation will explore how the partnership between SAP and Onapsis offers crucial support to customers in managing cyber risks. The session aims to provide insights into effectively navigating the complex cybersecurity landscape. Attendees will learn how this collaboration enhances customers’ defenses against evolving threats, emphasizing empowerment and proactive protection.
2024 has just begun, but we are firm believers that the best way to prepare for the future is to evaluate the past and look ahead. Join JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) as they recap trends from 2023 and provide best practices to prepare you for threats in 2024.
Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, those applications enable the most critical business functions of your organization, such as financials, manufacturing, and the supply chain. With SAP as the core technology foundation for many large enterprises, it presents an attractive target for…
Businesses rely on enterprise resource planning (ERP) systems like SAP to consolidate their critical assets, data, and intellectual property. While these systems unify platforms and departments, centralizing vast amounts of enterprise data makes them attractive targets for malicious actors. An interconnected system with inadequate ERP security heightens the risk of attacks, making ERP systems prime…
Unlock the secrets to fortifying your company’s digital defenses in this engaging Podcast. We’ll spotlight the crucial gaps that often exist between SAP security and traditional IT safeguards, presenting six vulnerabilities you can’t afford to ignore. From application layer blind spots to the challenges of implementing complex security tools, we’ll break it all down. Onapsis…