Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

Cyber Tech Talk Features: The Onapsis Research Labs

In this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.

Resource Placeholder

Le paysage des menaces se transforme: Mieux comprendre comment protéger les applications critiques SAP contre les menaces

Les applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux – et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.

Resource Placeholder

The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP Vulnerabilities

Learn about ‘Elephant Beetle’ & their SAP vulnerability exploitation techniques. Enhance your SAP security and prevent similar attacks.

Resource Placeholder

Log4j Vulnerability: Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

SAP and Onapsis share steps to protect business-critical SAP applications and improve SAP security to mitigate the threat of the Log4j vulnerability to the log4shell exploits.

Resource Placeholder

Critical ICMAD Vulnerabilities: Who Is at Risk & How to Protect Your Business-Critical SAP Applications

Who Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.

Resource Placeholder

The ICMAD Vulnerabilities: Who Is at Risk and How to Protect Your Business-Critical SAP Applications

Onapsis Research Labs’ thorough investigation of HTTP Response Smuggling over the last year led to the recent identification of the ICMAD vulnerabilities. Read the threat report from Onapsis Research Labs to understand: Onapsis worked closely with SAP’s Product Security Response Team to discover and patch these critical vulnerabilities. Both companies believe that all unpatched SAP applications…

Resource Placeholder

5 Reasons Why You Need Application Security Testing for Business-Critical SAP Applications

Build security into the development process. Here are five reasons why you need application security testing (AST) capabilities specifically designed for your business-critical SAP applications.

Resource Placeholder

SAP Business Risk Illustration: Cyber Risk Assessment

40,000+ ORGANIZATIONS USING SAP ARE AT RISK OF RECON VULNERABILITY Successful Exploit Could Allow Unauthenticated Full System Access; Impact Business Operations and Regulatory Compliance

Resource Placeholder

Cyber Tech Talk Series – Transformation Takeaways: 4 Learnings From Industry Leaders

Many organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.

Page 22 of 33