Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Volume I: The Risks of Downwards Compatibility
SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would…
Trust, but Verify: Protecting Your Business-Critical Applications
Levi Strauss’s Deputy CISO, Steve Zalewski discusses the concept of “trust, but verify” when undergoing digital transformation projects and working with both vendors and third-party security providers.
Cybersecurity Awareness Month: Protect Your Organization from Ransomware
This month marks CISA’s 18th Cybersecurity Awareness Month, a joint effort between the government and public to raise awareness of the importance of cybersecurity. In this blog, we’ll share ways to protect yourself, your organization, and its most critical systems from ransomware.
