bowbridge SAP Cybersecurity Blog
bowbridge-banner-1

bowbridge SAP Cybersecurity Blog

Joerg Schneider-Simon

As Chief Technology Officer and Co-Founder of bowbridge Software, Joerg brings decades of experience designing, evolving and promoting complex IT security solutions to enterprise customers. With his deep technical acumen and exceptional customer focus, he has contributed to the global success of some of the world’s leading technology brands.

 


 

Recent Posts:

SAP-in-the-cloud

Apr 22, '20 by Joerg Schneider-Simon

Migrating your SAP systems to the cloud offers many operational and financial benefits. SAP migration to the cloud reduces your hardware costs, makes backup and disaster recovery more robust, and improves availability, reliability and scalability.

A...

MIME-types

Apr 14, '20 by Joerg Schneider-Simon

Editor's Note: We recently updated this previously published post with new insights. Enjoy!

Want to protect your SAP applications against file-based attacks? Use MIME-Type checks.

One way that cyber attackers attempt to compromise SAP systems is by...

SAP-vulnerabilities-2020

Mar 3, '20 by Joerg Schneider-Simon

While SAP helps businesses operate more efficiently through streamlined business processes, its complexity means it presents a significant attack surface for hackers.

Since businesses use SAP for managing their most sensitive business processes, it...

SAP-security-notes-2020

Feb 12, '20 by Joerg Schneider-Simon

We’ve said it before: Keeping SAP security patches up to date is one of the most effective ways to prevent a successful cyberattack.

To make that task a bit easier, here is our quick summary of the Security Notes Update that SAP issued in January...

cybersecurity-automation2

Jan 30, '20 by Joerg Schneider-Simon

Cyberattacks are now heavily automated. Is the solution automated cybersecurity?

Hackers are launching fearsome new attacks against SAP systems across multiple industries using self-directed software tools and processes. Malicious actors are using...

Beyond Phishing: Smishing, Vishing and Other Emerging Cybersecurity Threats

Jan 21, '20 by Joerg Schneider-Simon

Cybersecurity Ventures predicts that cybercrime will cost the world $6 trillion annually by 2021, making cybercrime more profitable than the global trade in all major illegal drugs combined.

Cybercriminals are turning to a multitude of new tactics...

top-file-based-threats

Jan 2, '20 by Joerg Schneider-Simon

A whopping 92% of malware is still delivered by email, according to Verizon’s Breach Investigations report.

The majority of these threats arrive in the form of phishing links. But a sizeable percentage still arrive as email attachments. And we’re...

IDC-survey-lessons

Dec 9, '19 by Joerg Schneider-Simon

More than two-thirds of ERP systems were breached in the last 24 months according to a 2019 survey conducted by IDC for Onapsis.

ERP Security: The Reality of Business Application Protection, the IDC survey of 430 IT decision makers, reveals that 64%...

compromised-system

Nov 7, '19 by Joerg Schneider-Simon

One day back in 2013, a group of hackers—likely backed by China—booted up their computers and began breaking into USIS, a US federal contractor that conducted background checks for the US Department of Homeland Security. The hackers gained access by...