Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications
While the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet. This scenario dramatically increases the universe of possible attackers, as malicious attackers can remotely try to compromise the organization’s…
Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java Solutions
SAP Application Servers Java, supported by the J2EE Engine, serve as the base framework for running critical solutions such as the SAP Enterprise Portal, SAP Exchange Infrastructure (XI), SAP Process Integration (PI) and SAP Mobile Infrastructure (MI). In addition, customers can also deploy their own custom Java applications on these platforms. In December 2010, SAP…
Volume II: SAP Knowledge Management – The Risks of Sharing
SAP Knowledge Management (SAP KM) is a central component of the SAP Enterprise Portal, enabling the information extracted from numerous data sources within the Organization to be displayed in a single access point. Employees, customers, vendors and business partners use this platform to interact with data provided by the company in order to fulfill their…
Volume I: The Risks of Downwards Compatibility
SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would…
Trust, but Verify: Protecting Your Business-Critical Applications
Levi Strauss’s Deputy CISO, Steve Zalewski discusses the concept of “trust, but verify” when undergoing digital transformation projects and working with both vendors and third-party security providers.
Cybersecurity Awareness Month: Protect Your Organization from Ransomware
This month marks CISA’s 18th Cybersecurity Awareness Month, a joint effort between the government and public to raise awareness of the importance of cybersecurity. In this blog, we’ll share ways to protect yourself, your organization, and its most critical systems from ransomware.
