Our latest technical blog from the Onapsis Research Labs provides details about securing SAP clients.
Manage the risk to your organization by including ERP systems SAP and Oracle in your overall cybersecurity strategy.
Join us at SAPInsider's Cybersecurity for SAP Customers event November 28 - 30 in Orlando, FL.
Your security teams spend hours configuring SAP to ensure its security, but how do you make sure the systems remain secure?
Our research team recently revealed a critical threat to SAP Netweaver - Join our upcoming webcast to learn more.
The goal of this blog post is to help you understand the importance of enabling the Table Change Logging in your SAP system and the risks that exist if you choose not to enable it.
A look at the OWASP Top 10 most critical web application security risks
As our readers know, we continuously share details to raise awareness and enable organizations to further secure their SAP infrastructure. In this specific blog, we will focus on one of the well-known SAP default users: TMSADM. What the security implications are of having it enabled with default passwords, and how to properly protect it? As you can imagine, it is not as simple as it sounds, so that’s why we created this blogpost for you.
In this month’s SAP Security Notes, it’s noticeable that the priority of the majority of security notes are higher compared to previous month.