SAP Security Notes April ‘18: Testing Assumptions
Our monthly report on how to improve your ERP security and take care of your most critical information housed in SAP by exploring the latest SAP Security Notes for April 2018.
Our monthly report on how to improve your ERP security and take care of your most critical information housed in SAP by exploring the latest SAP Security Notes for April 2018.
Our monthly report on how to improve your ERP security and take care of your most critical information housed in SAP by exploring the latest SAP Security Notes.
Our monthly report on how to improve your ERP security and take care of your most critical information housed in SAP by exploring the latest SAP Security Notes.
A look at the SAP Security Notes released for January 2018
An overview of SAP's 2017 Security Notes and how it may affect your security strategy for 2018.
To wrap up 2017, the last SAP Note Tuesday of the year, SAP has released a total of 19 notes this month. Six of these notes have already been released throughout the course of the month with the remaining 13 released today.
I was given the privilege last week of addressing attendees at the inaugural CyberSecurity for SAP Customers conference in Las Vegas on the topic of GDPR. Specifically, I presented the topic 'Mapping Your SAP Systems to GDPR Compliance Requirements'.
Today SAP has released another batch of its security notes, a regular event which happens every second Tuesday of the month. The total number of notes this month is 32, of which 18 have been released today. The other 14 notes have been released in the course of the past month. Those notes generally concerned re-releases.
Since it is the second tuesday of the month, SAP has again published a new set of notes to patch vulnerabilities found in its software. Over the course of the month, counting from the last patch tuesday, a total of 30 new notes were published. Today, half of those notes were posted.
At Onapsis we recognize that information security means more than just protecting your business-critical applications from possible invaders. Worldwide, we see cybersecurity regulations maturing, leading to added pressure for companies to stay compliant. It is clear that, apart from the obvious technical component, the legal aspects of the information security domain demand a growing slice of attention to maintain business prosperity.