bowbridge SAP Cybersecurity Blog
bowbridge-banner-1

bowbridge SAP Cybersecurity Blog

ioT

Aug 21, '18 by Joerg Schneider-Simon

The internet has come a long way since the days of screeching dial-up modems. We’ve become used to quick and reliable internet access from our computers and smartphones.

The new frontier? Connected appliances, vehicles, equipment, and more. The...

Onapsis-report-banner

Aug 9, '18 by Joerg Schneider-Simon

On July 25th, the world received some startling news: The US Department of Homeland Security had issued an alert about ERP systems (specifically, SAP and Oracle) being targeted by nation-state attackers, cybercriminals, and hacktivist groups.

This...

merger-due-dilligence

Jul 19, '18 by Joerg Schneider-Simon

Whether a company is looking at customers, suppliers, production, or finances, it’s looking at data. And SAP is one of the most widely used platforms for companies to manage their data and perform the multiple tasks that keep a business running.

So,...

supply-chain-security

Jul 10, '18 by Joerg Schneider-Simon

Supply chains keep an organization operating at full pace … or they can stop a company in its tracks. Without a well-run supply chain, a company can’t produce their product, maintain their equipment, or even manage day-to-day operations.

Today’s...

SAP-e-recruiting-vulnerability

Jun 28, '18 by Joerg Schneider-Simon

It’s no surprise that SAP is one of the most widely used business platforms in the world, considering how wide-ranging and versatile it is.

And as a responsible company, SAP works hard to push out patches, called “security notes” in SAP-speak on a...

FIORI-and-virus-scanning

Jun 21, '18 by Joerg Schneider-Simon

Our world is getting increasingly mobile. Our socializing, our banking, our dating, our bitter family arguments about politics … more and more, it’s all taking place on our mobile devices.

Business is no different. Increasingly, company employees...

HR-cybersecurity-target

Jun 7, '18 by Joerg Schneider-Simon

Cybercriminals are always looking for ways to get through a company’s cybersecurity defenses. And in 2017, Human Resources departments became a prominent victim.

A Petya ransomware variant named “GoldenEye” targeted HR departments, by way of...

Government-SAP-vulnerabilities

May 17, '18 by Joerg Schneider-Simon

Processes and data: These are two things the average government agency has in abundance. And after decades of distributing massive procedural binders and struggling with file and document management, many government departments have found themselves...

data-sabotage

May 2, '18 by Joerg Schneider-Simon

Cyberattacks are changing. Previously, a common goal among cyberattackers was to pull off a large-scale attack that would either result in a massive theft or a complete shutdown of the target’s systems. Big and splashy, these attacks would make news...