Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Cybersecurity Threats and Challenges to SAP Systems 2025
Based on a survey of the SAPinsider community, this infographic explores the evolving cybersecurity threats impacting SAP systems.
Cybersecurity Threats and Challenges to SAP Systems 2025
Uncover 2025’s top SAP cybersecurity threats, from unpatched systems to data breaches. Get expert insights & investment recommendations to secure your critical SAP landscape.
Cybersecurity Threats and Challenges to SAP Systems 2025
Learn why data exfiltration is now the #1 SAP threat and how to overcome patching challenges. This Onapsis and SAPinsider webinar offers actionable strategies to secure your critical data.
Cybersecurity for SAP – Rethinking Risk, Readiness, and Resilience
Watch the authors of “Cybersecurity for SAP”, JP Perez-Etchegoyen and Gaurav Singh, as they talk you through their book and explore how to assess real-world threat scenarios, system-level vulnerabilities, and develop tools for a more robust enterprise cybersecurity strategy.
ASUG Talks Roundtable: Cybersecurity in the Cloud
As SAP customers migrate to the cloud, cybersecurity is a critical component of those transformation projects. Moving your IT ecosystem and sensitive organizational data from bare-metal, on-premises environments into the cloud requires a dedicated security approach, especially as threat actors’ efforts grow more sophisticated. In this ASUG Talks Roundtable, we dig into how enterprises should…
SAP a l’heure du Cloud : Comprendre et appliquer le modèle de responsabilité partagée
Sécurisez SAP dans le cloud et comprenez le modèle de Responsabilité Partagée de RISE avec Onapsis.
SAP Cybersecurity Q&A with Authors Gaurav Singh and Juan Perez-Etchegoyen
Authors Gaurav Singh and Juan Perez-Etchegoyen recently took part in the SAP PRESS Book Club webinar series, where they answered reader questions about cybersecurity for SAP over the course of an hour.
Executive Threat Overview: Critical Zero-Day SAP Vulnerabilities Under Active Global Exploitation
By exploiting these vulnerabilities, unauthenticated threat actors can gain unrestricted remote access to SAP business-critical data and
Threat Briefing Report: Critical SAP Vulnerabilities (CVE-2025-31324 and CVE-2025-42999) Under Active Mass Exploitation
This consolidated threat advisory [TLP:CLEAR] is provided to support defenders in their assessment of exposure and compromise against the active mass exploitation of SAP security vulnerabilities CVE-2025-31324 and CVE-2025-42999.
