Publications
Volume V: Our Crown Jewels Online – Attacks targeting SAP Web ApplicationsWhile the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet.
Publications
Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java SolutionsSAP Application Servers Java, supported by the J2EE Engine, serve as the base framework for running critical solutions such as the SAP Enterprise Portal, SAP Exchange Infrastructure (XI), SAP Process Integration (PI) and SAP Mobile Infrastructure (MI).
Publications
Volume III: The Silent Threat – SAP Backdoors and RootkitsBackdoors and rootkits have existed for a long time in computer code and programs.
Publications
Volume II: SAP Knowledge Management - The Risks of SharingSAP Knowledge Management (SAP KM) is a central component of the SAP Enterprise Portal, enabling the information extracted from numerous data sources within the Organization to be displayed in a single access point.
Publications
Volume I: The Risks of Downwards CompatibilitySAP has implemented several unique password hashing procedures in its history.
For your business to survive a security incident, it needs to get back to doing business as soon
AUTOMATE THE AUDIT
If you work for a public company, you know the pain
Video
Customer Interview: Dow ChemicalWatch Mauricio Guerra, CISO at Dow Chemical, as he describes how the company assessed areas of ri
Video
Securing SAP: Thoughts From a Former CISOHear from Jason Fruge, VP of Business Application Cybersecurity, his advice to CISOs for securing
Video
Trust, but Verify: Protecting Your Business-Critical ApplicationsLevi Strauss's Deputy CISO, Steve Zalewski discusses the concept of "trust, but verify" when unde
Publications
Cybersecurity Awareness Month: Protect Your Organization from RansomwareThis month marks CISA’s 18th Cybersecurity Awareness Month, a joint effort between the government and public to raise awareness of the importance of cybersecurity. In this blog, we’ll share ways to protect yourself, your organization, and its most critical systems from ransomware.