Protecting critical data from interconnected risk was SAP’s main motivation for introducing Read Access Logging (RAL). Learn how to use RAL to detect and analyze fraud or data theft to ensure SAP security.
On June 28, a number of our customers contacted us sharing unsolicited emails they received claiming to have knowledge about the existence of “research” describing “zero-day vulnerabilities” (dubbed Sleepy Leopard) in the on-premise software version of the Onapsis Platform. All the claims presented in the anonymous “research” are untrue.
Clean code is code that is easy to understand and follows secure coding best practices to minimize the risk of vulnerabilities. It is critical to scan existing custom-built code to identify and fix vulnerabilities as well as validate the quality. However, without the right tool, creating clean code can be challenging when faced with the overwhelming demand to build new functionality quickly and get it to production as fast as possible.
There is no doubt that moving an ERP system to the cloud is a massively complex project for any organization. This blog offers a few tips on how to manage and mitigate the risks from start to finish to help ensure a successful migration and how The Onapsis Platform can help.
In SAP's June Patch Day, there are 17 new and updated security patches. The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) also lists three well known vulnerabilities.