We’ve all encountered instances of a malware attack on a friend’s or relative’s home computer — or even on our own. Personal cybersecurity breaches can be inconvenient and distressing, especially if they result in frustrating identity theft or...
Oct 30, '17 by Joerg Schneider-Simon
October is cybersecurity awareness month. We look at Equifax’s cybersecurity nightmare and how your SAP system may put you at similar risk.
It has been only about a month since Equifax went public with news of a security breach that affected over...
Oct 19, '17 by Joerg Schneider-Simon
Staying on top of SAP cybersecurity requires unceasing vigilance. This year’s SAPinsider Events offer an excellent opportunity to learn the latest news on the industry’s biggest threats and smartest best practices.
Oct 17, '17 by Joerg Schneider-Simon
October is Cybersecurity Awareness Month. We take a look at the explosive growth of cybercrime as a service and how it puts your SAP system at risk.
We live in an age where we can outsource just about anything. From virtual assistants to lawn care...
Oct 11, '17 by Joerg Schneider-Simon
Technology security professionals see a staggering variety of cyberattacks and are constantly on guard for new threats on the horizon. But even the most weathered IT pro feels a rise in blood pressure when they hear this phrase: cross-site scripting.
Sep 21, '17 by Joerg Schneider-Simon
SAP recently issued a security note addressing a vulnerability in the SAP E-Recruiting application:
“When a user registers to the e-recruiting application, he/she receives a link by email to confirm access to the provided email address. However,...
Aug 29, '17 by Joerg Schneider-Simon
Many businesses rely on SAP CRM (Customer Relationship Management) and SRM (Supplier Relationship Management) applications to manage workflows, standardize processes and centralize data. But, while these applications are eminently useful, they might...
Jul 19, '17 by Joerg Schneider-Simon
Considering how SAP systems are often interlinked with critical financial data, human resources records, and even vital infrastructure, a cyberattack could be devastating.