cybersecurity

88 results

  1. Cybersecurity and Data Protection: Taking an Integrated Approach

    Reading time: 2 mins

    By Fred Donovan, Senior Editor, SAPinsider “The threat actor only needs to be right once. We need to be right every time,” says Scott Margolis, Managing Director for the Data Privacy and Protection Practice at Ernst & Young (EY).   The best way to stay ahead of threat actors, considering the global shift to remote work, is to implement an “integrated approach” to…

  2. Securing the Intelligent Enterprise from Cyberattacks

    May 14, 2021

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…

  3. Registration Now Open: SAPinsider EMEA 2022 Conference

     

    November 15 - 17, 2022

     

    Vienna, Austria

     

    Registration is now open for SAPinsider EMEA 2022, taking place November 15-17, 2022, in Vienna, Austria. Join an immersive experience designed to provide you with best practices and expert recommendations for maximizing on your SAP investments and preparing for new opportunities. The conference will bring the entire SAP ecosystem together to learn, connect, and expand…

  4. Support Regulatory Compliance Across Your SAP Landscape with SAP Data Privacy Integration

    Support Regulatory Compliance Across Your SAP Landscape with SAP Data Privacy Integration

    Reading time: 13 mins

    While it is important for businesses to ensure data privacy to gain the trust of both customers and business partners, the protection of this data is critical for adhering to the regulations that countries are introducing at a growing rate, with more data privacy bills introduced in 2020 compared to 2019. These regulations — such…

  5. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 19 mins

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  6. cybersecurity

    High Profile Vulnerabilities in SAP Applications and How to Be Prepared

    Reading time: 7 mins

    Enterprise software is complex due to its nature and interconnectivity to business processes. On top of that, software is created by humans, which means that vulnerabilities are inevitable. Those affect SAP technology will ultimately impact the business and should be properly managed from a risk perspective. This article, written by a cybersecurity expert, explains a…

  7. Protect Your SAP Systems from Cyberattacks

    Protect Your SAP Systems from Cyberattacks

    Reading time: 9 mins

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  8. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

    Read this blog written by an SAP security and compliance lead for advice on how companies can best ensure their networks are secure. Learn the steps necessary to evaluate, identify, and craft effective cybersecurity umbrellas for SAP systems.