When it comes to Oracle EBS security, there are many steps to take to proactively protect your organization. Restricting file type and size is one of them. Learn more about why and how to prevent unintended consequences.
Our quarterly analysis of the Oracle CPU for October 2018. This time, half of the vulnerabilities this quarter have a direct impact on business-critical applications.
Learn how to further protect your SAP systems by checking if your ABAP systems contains stored insecure hashes.
Includes a step-by-step CPU implementation guide for Oracle E-Business Suite.
Our research team recently revealed a critical threat to SAP Netweaver - Join our upcoming webcast to learn more.
April 2018 Oracle Critical Patch Update: Oracle Patches 254 Vulnerabilities, 176 Specific to Financials
Onapsis helps secure 92% of Oracle E-Business Suite Financials vulnerabilities
The goal of this blog post is to help you understand the importance of enabling the Table Change Logging in your SAP system and the risks that exist if you choose not to enable it.
Onapsis confirms public exploit attacking Oracle applications can affect Oracle E-Business Suite
Oracle October CPU: Onapsis Contributes to EBS Security by Reporting Almost 60% of the Vulnerabilities, Including Those Most Critical
One of the most important components of securing business-critical applications is to ensure the systems are always up to date with the latest security patches to reduce the risk level. Today Oracle released the last Critical Patch Update (CPU) of the year. In this CPU, Oracle stopped an increasing trend seen in the last three CPUs, where Oracle continually fixed more vulnerabilities during each new CPU. In the latest CPU, Oracle fixed 252 security vulnerabilities.
At Onapsis we recognize that information security means more than just protecting your business-critical applications from possible invaders. Worldwide, we see cybersecurity regulations maturing, leading to added pressure for companies to stay compliant. It is clear that, apart from the obvious technical component, the legal aspects of the information security domain demand a growing slice of attention to maintain business prosperity.