Enterprise systems powered by SAP run core business functions—finance, supply chain management, and HR—and for this reason, they are attractive targets for cybercriminals. Traditional defense tactics ...
As organizations continue to innovate and expand their technology stack, they also increase their cyber vulnerabilities. With 92% of Forbes Global 200 companies using SAP and corporate cyberattacks ...
It was just a few years ago that I first got religion on SAP cybersecurity. I was serving as Chief Information Security Officer (CISO) for a large retailer. The company had begun migrating from ...
SecurityBridge, the Cybersecurity Command Center for SAP, is releasing its SecurityBridge Code Vulnerability Analyzer (CVA) powered by AI, a significant enhancement to its holistic SAP security ...
Cloud security firm Wiz has published a detailed report about SAP security holes, now patched, that raises alarming questions about the secondary role AI efforts are having on cybersecurity defenses.
Onapsis Defend integration with Microsoft Sentinel Solution for SAP helps Security Operations teams strengthen SAP threat detection and response SOC teams struggle with a profound visibility gap into ...
SecurityBridge, the Cybersecurity Command Center for SAP, is collaborating with Microsoft to integrate SAP data into Microsoft Sentinel—enabling SecurityBridge to seamlessly share SAP security events ...
Cybersecurity is a top priority in the boardroom, with billions spent on defense. Yet, an astonishing paradox persists: The systems running companies’ core operations—notably SAP enterprise ...
Fully-functional exploit code is now publicly available for a maximum severity pre-auth vulnerability impacting default configurations of an SAP Solution Manager (SolMan) component. SAP SolMan is an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results