Daniel Antonelli is a cybersecurity professional specializing in security research and vulnerability management. With a focus on protecting critical business systems like SAP, Daniel has contributed to enhancing the security posture of organizations across industries. His expertise in identifying and mitigating cyber threats, coupled with a deep understanding of enterprise IT environments, makes him a key player in advancing cybersecurity efforts and ensuring the resilience of complex infrastructures.
Our monthly report on how to improve your SAP security and take care of your most critical information by exploring the latest SAP Security Notes for April 2019.
Our monthly report on how to improve your SAP security and take care of your most critical information by exploring the latest SAP Security Notes for March 2019.
Our monthly report on how to improve your SAP security and take care of your most critical information by exploring the latest SAP Security Notes for February 2019.
Our monthly report on how to improve your SAP security and take care of your most critical information by exploring the latest SAP Security Notes for August 2018.
The goal of this blog post is to help you understand the importance of enabling the Table Change Logging in your SAP system and the risks that exist if you choose not to enable it.
Our monthly report on how to improve your ERP security and take care of your most critical information housed in SAP by exploring the latest SAP Security Notes.
An overview of SAP’s 2017 Security Notes and how it may affect your security strategy for 2018.
What the SAP security implications of having TMSADM enabled with default passwords and how can you properly protect it?
Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.
Start Now
Learn how to build cyber resilience during your SAP cloud migration journey.
Watch Now
Executive overview of a reported SAP cyber attack that severely impacted business operations.
Read Now
We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.
Watch Now
Discover why leading enterprises tryst Onapsis to secure their most critical business applications
Read More