As organizations increasingly transition their SAP environments to the cloud, the need for robust security has never been greater. Protecting critical business data in these cloud-based systems is a complex challenge — one that traditional...

Nov 12, '24 by Joerg Schneider-Simon
In an October 2024 IDC article entitled, “Storm Clouds Ahead: Missed Expectations in Cloud Computing,” the authors conduct an analysis of cloud repatriation trends. The main premise of the article is that the cloud computing landscape is...

Aug 28, '24 by Joerg Schneider-Simon
We were thrilled to join Accenture, Fortinet, and SecurityBridge to host the premier SAP security event of the year, “Secure Together,” in Rotterdam on June 19, 2024. If you weren’t able to make it, read on to learn more about the topics and trends...

Aug 26, '24 by Joerg Schneider-Simon
Whether you work at a small K-12 school district or a huge state university, SAP plays a big role in education, controlling important operational functions of your school from payroll and PTO requests to maintenance schedules and contracts.
So,...

May 7, '24 by Joerg Schneider-Simon
In the digital era, where data is as valuable as gold, cybersecurity has become a cornerstone for businesses worldwide.
One area that often flies under the radar — but warrants significant attention — is the management and security of XML files,...

Apr 30, '24 by Joerg Schneider-Simon
In today's digitally driven corporate environments, SAP applications stand as colossal pillars supporting myriad business processes, from procurement and supply chain management to human resources and customer relationship management.
However, the...

Apr 23, '24 by Joerg Schneider-Simon
In the complex world of cybersecurity, PDF files represent not just documents. They’re also sophisticated vehicles for potential exploitation. Within the intricate framework of SAP applications, PDFs harbor multifaceted technical vulnerabilities...

Apr 17, '24 by Joerg Schneider-Simon
Your organization faces an ever-growing threat of ransomware attacks. The year 2023 saw ransomware attacks increase by a whopping 95% over the previous year. Worldwide, more than 72% of businesses were affected by ransomware attacks in 2023.
To...