Onapsis Debuts New AI to Boost S/4HANA, RISE and BTP Security

48 results

  1. Securing SAP Systems in the Age of Artificial Intelligence

    Historically, SAP has employed conventional methods to secure its systems. However, the most critical areas in SAP cybersecurity now require professionals to leverage AI. The widespread adoption of artificial intelligence (AI) technology has introduced challenges in ensuring the security of SAP systems. To address the evolving cyber threats in the SAP ecosystem, cybersecurity experts specializing…

  2. SAP Security Patch Day June 2023: Cross-Site Scripting Takes Center Stage

    In June, SAP released thirteen new and updated patches, with four of them categorized as High Priority Notes. The main focus of these patches was on addressing Cross-Site Scripting (XSS) vulnerabilities in various components. Eight notes specifically targeted XSS vulnerabilities, while two High Priority Notes (#3326210 and #3324285) focused on the SAPUI5 component. Additionally, Onapsis…

  3. March 2023 Security Notes News

    Each month, SAPInsider reviews the previous month’s SAP Security Hot News and Notes to help SAPInsiders decide what to do with SAP’s recommendations. This blog breaks down the latest Security notes by vulnerability and risk rating, explains what the risks are, and makes recommendations to help with analysis, installation, and testing. The March 2023 blog…

  4. Are You Prepared For A Cyber Attack?

    In SAPinsider’s latest Cybersecurity focused research, the biggest factor for organizations when it comes to securing their SAP systems is the need to protect access to the data in those systems. However, almost as important is pressure to keep systems secure from ransomware and malware attacks. And when asked to rank the top cybersecurity threats…...…

  5. Protecting the mission-critical applications that run your business

    Over the last few months, everywhere you turn, there’s another story about debilitating ransomware attacks on mission-critical or business-critical systems. From fuel and energy companies to food processing companies, no industry is safe or immune. The traditional ways in which we respond to ransomware attacks no longer are as effective. What’s needed is a new…

  6. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…

  7. Cloudy with a chance of security & compliance

    Security and compliance continue to be the top concerns for migrating to SAP S/4HANA in the cloud, even above performance, flexibility, and cost. That’s because, ultimately, it’s still your responsibility to ensure the security of your data and applications – even if they reside in someone else’s datacenter. Fortunately, a strong cloud provider and the…

  8. A Holistic Approach to Managing Cybersecurity & Protecting Your Data

    The COVID-19 pandemic has ushered in a new paradigm in which legacy security tools and practices have left gaping holes in corporate data protection. To plug these gaps and counter increasing threats, organizations should employ a holistic approach to cybersecurity, privacy, and data protection. Scott Margolis, Managing Director for the Data Privacy and Protection Practice…

  9. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…

  10. Why SAP customers need DevSecOps now more than ever

    Setting DevSecOps goals are a key component for aligning mission-critical application functionality with business needs. However, these goals create challenges for teams supporting SAP mission-critical applications. With multiple technologies, architectures, and a lack of unified development sets, SAP application developers handle changes through manual coding and change processes. Errors in custom code can create quality,…