As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
Onapsis Chief Technology Officer JP Perez-Etchegoyen explains why an enterprise cybersecurity strategy for protecting business-critical applications should start with alignment to a strong security framework.
Onapsis Research Labs advise extra vigilance during this time. Please take extra steps to ensure that your organization and your business-critical applications are protected and resilient.
Onapsis Research Labs discovered a set of extremely critical vulnerabilities affecting SAP applications actively using the SAP Internet Communication Manager (ICM) component. This discovery requires immediate attention by most SAP customers.
Threat group ‘Elephant Beetle’ exploited two SAP vulnerabilities to steal millions of dollars from financial organizations. Here’s what that means for your SAP security.
What’s needed to protect your organization’s business-critical applications from the looming threat of ransomware? That’s exactly what SAP and Onapsis will seek to address here.
According to threat intelligence issued by SAP and Onapsis, there’s a critical cybersecurity blind spot impacting how many organizations protect their mission-critical SAP applications. At the same time, it’s clear that threat actors are active, capable, and widespread.
Let’s take a look at some of the top myths around SAP security and use these insights to help make better decisions to keep your organization secure.
According to reports, nearly 70% of enterprises were moving mission-critical business functions and processes to the cloud before the pandemic. In today’s new normal, that number has skyrocketed. Organizations increasingly rely on mission-critical cloud applications, such as SAP SuccessFactors and Salesforce, to help modernize business practices, streamline processes, and provide increased flexibility to adapt to work-from-anywhere initiatives.
Onapsis, in collaboration with The Cloud Security Alliance (CSA), a not-for-profit, organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, has completed The Critical Controls Implementation for SAP white paper.