bowbridge-banner.png

bowbridge Blog

Joerg Schneider-Simon

As Chief Technology Officer and Co-Founder of bowbridge Software, Joerg brings decades of experience designing, evolving and promoting complex IT security solutions to enterprise customers. With his deep technical acumen and exceptional customer focus, he has contributed to the global success of some of the world’s leading technology brands.

 


 

Recent Posts:

Mar 3, '20 by Joerg Schneider-Simon

While SAP helps businesses operate more efficiently through streamlined business processes, its complexity means it presents a significant attack surface for hackers.

Since businesses use SAP for managing their most sensitive business processes,...

Feb 12, '20 by Joerg Schneider-Simon

We’ve said it before: Keeping SAP security patches up to date is one of the most effective ways to prevent a successful cyberattack.

To make that task a bit easier, here is our quick summary of the Security Notes Update that SAP issued in January...

Jan 30, '20 by Joerg Schneider-Simon

Cyberattacks are now heavily automated. Is the solution automated cybersecurity?

Hackers are launching fearsome new attacks against SAP systems across multiple industries using self-directed software tools and processes. Malicious actors are...

Jan 21, '20 by Joerg Schneider-Simon

Cybersecurity Ventures predicts that cybercrime will cost the world $6 trillion annually by 2021, making cybercrime more profitable than the global trade in all major illegal drugs combined.

Cybercriminals are turning to a multitude of new...

Jan 2, '20 by Joerg Schneider-Simon

A whopping 92% of malware is still delivered by email, according to Verizon’s Breach Investigations report.

The majority of these threats arrive in the form of phishing links. But a sizeable percentage still arrive as email attachments. And we’re...

Dec 9, '19 by Joerg Schneider-Simon

More than two-thirds of ERP systems were breached in the last 24 months according to a 2019 survey conducted by IDC for Onapsis.

ERP Security: The Reality of Business Application Protection, the IDC survey of 430 IT decision makers, reveals that...

Nov 7, '19 by Joerg Schneider-Simon

One day back in 2013, a group of hackers—likely backed by China—booted up their computers and began breaking into USIS, a US federal contractor that conducted background checks for the US Department of Homeland Security. The hackers gained access...

Sep 30, '19 by Joerg Schneider-Simon

In April 2019, hackers uploaded a series of exploits targeting SAP business applications to a public forum.

These exploits, referred to as 10KBLAZE, leverage insecure default configurations that SAP has known about for a while and had corrected...

Sep 24, '19 by Joerg Schneider-Simon

Cybersecurity talent shortages. Employees and vendors who think security policies are just a suggestion. A rapidly growing, AI-driven tsunami of threats.

The role of a Chief Information Security Officer is not exactly what we’d call relaxing.

To...