bowbridge SAP Cybersecurity Blog
bowbridge-banner-1

bowbridge SAP Cybersecurity Blog

What Are the Risks of Artificial Intelligence in Cybersecurity and to your SAP System?

Aug 21, '23 by Joerg Schneider-Simon

Ransomware continues to be one of the top varieties of malicious software. And it’s wreaking havoc, grinding company operations to a halt as the ransomware renders mission-critical data and systems inaccessible, while also exposing companies to huge...

improve-sap-fiori-security

Jun 14, '23 by Joerg Schneider-Simon

Hackers have been quick to notice that many SAP applications, servers, and databases that were once hidden behind corporate firewalls are now exposed to the web, making them prime targets for attacks.

One common denominator in this push to the web...

Cyber Insecurity Ranks Eighth Place in WEF Global Risks Report 2023

Apr 25, '23 by Joerg Schneider-Simon

The world faces a set of risks that feel both wholly new and eerily familiar. The Global Risks Report 2023, published by the World Economic Forum (WEF), explores some of the most severe risks we face over the next decade.

As you can see from the...

7 Ways to Improve SAP S4/HANA Security With Virus Scanning

Feb 28, '23 by Joerg Schneider-Simon

Talk to your average hacker, and they’ll tell you they prefer to target networks and applications that host mission-critical data.

The more valuable the data, the more attractive the target.

This is why plenty of cybercriminals have their sights set...

SAP Security Solutions for the Retail Industry

Feb 13, '23 by Joerg Schneider-Simon

Retailers face multiple (and growing) challenges in a highly competitive marketplace. To meet these challenges, many retailers turn to SAP to transform the customer experience across every channel while improving sustainability across the entire...

Understand SAP’s File Transfer Security Gap

Dec 15, '22 by Joerg Schneider-Simon

Hackers know there is an open door into SAP. They exploit users and the application layer by introducing malicious files. This attack vector is in the application’s critical path, as attaching supporting documents to transactions is a common...

No Malware Protection Guarantee

Apr 20, '22 by Joerg Schneider-Simon

If Benjamin Franklin were alive today, he would likely expand his famous aphorism to say: “There are only three certainties in life—death and taxes—and malware.”

Malware is a certainty in life and business because there is no way to protect your...

SAP-security-uploads

Apr 12, '22 by Joerg Schneider-Simon

This post is the second in our two-part series on how to protect your SAP systems against file-based attacks. Read the first post: SAP Security for Beginners: How to Safely Upload Files into Your SAP System.

Malware in file uploads wreaks havoc on...

SAP-security-beginners

Mar 16, '22 by Joerg Schneider-Simon

File uploads are a necessary part of doing business, particularly these days when so many employees are working remotely.

And SAP is no different. SAP applications used to manage suppliers, procurement, recruiting, finances, and dozens of other...