Paul Laudanski, Director of Security Research at Onapsis, brings to his role over twenty years of experience in cybersecurity, threat research and engineering, threat intelligence, and counterintelligence. Paul is also a member of the Onapsis Research Labs team and is dedicated to hunting down vulnerabilities within business critical applications which have helped to remediate over 1,000 zero day vulnerabilities within SAP and Oracle applications. Paul holds a BA in mathematics from Rider University and lives in Tacoma, Washington with his family.
Most Security Operations Centers (SOCs) operate with a dangerous blind spot. While they have mature playbooks for isolating infected endpoints or blocking malicious IPs at the firewall, they often lack a specific protocol for the organization’s most critical asset: the ERP system. This gap is existential. You cannot simply “pull the plug” on a production…
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
When securing SAP, a debate often arises: is it better to use an “embedded” tool that runs inside SAP or an “independent” platform that runs outside of it? While embedded tools seem convenient, they present significant risks. A truly resilient and effective SAP security strategy requires an independent, external platform. This approach provides superior resilience…
Struggling with SAP access control? This definitive guide breaks down the four pillars of access risk management to help you prevent SoD conflicts and enforce least privilege.
Learn why default SAP Knowledge Management (KM) configurations create critical security risks. Our guide covers 5 key settings to prevent vulnerabilities.
Discover how the SAP security landscape is evolving in 2025, driven by digital transformation, outsourcing, and sophisticated zero-day attacks. Learn why protecting your business-critical SAP systems from modern cyber threats is no longer a question of ‘if,’ but ‘when,’ and explore key steps for enterprise protection.
Onapsis CTO & Onapsis Director of Security Research discusses learnings from one year after our SAP threat landscape report: CH4TTER.
CISA warned organizations about the active exploitation of CVE-2017-12637. This known vulnerability was initially patched by SAP in 2017. However in some cases, installations could be exposed despite the patch being applied, as warned by SAP in 2024.