The Onapsis Security Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Thumbnail
Wednesday Whisper: How to Become Cyber Resilient

Wednesday Whisper: How to Become Cyber Resilient

Effective planning for a cyberattack requires participation from many different departments in an organization. It’s not enough for the security and IT teams to have an incident response (IR) plan ready should a security incident occur. While they are experts when it comes to technology, successful preparation for a cyberattack involves much more than just what to do with computers and related equipment.
Thumbnail
ERP Security & IT General Controls: ‘Questions Every Organization Needs to Ask’

ERP Security & IT General Controls: ‘Questions Every Organization Needs to Ask’

A recent IDC survey reports that 64% of organizations have suffered an ERP system breach in the past 24 months. To ensure that your organization has the proper processes and controls in place to keep SAP and Oracle E-Business Suite business-critical applications secure and in compliance, we are providing guidance and questions to ask.
Thumbnail
Blog Banner

GDPR and SAP: Will it Affect You and What Steps You Can Take Now

At Onapsis we recognize that information security means more than just protecting your business-critical applications from possible invaders. Worldwide, we see cybersecurity regulations maturing, leading to added pressure for companies to stay compliant. It is clear that, apart from the obvious technical component, the legal aspects of the information security domain demand a growing slice of attention to maintain business prosperity.

Subscribe to compliance

Request a
Business Risk Illustration

Examine the operational risk and cybersecurity posture of your business-critical applications to determine the potential impact of sub-optimal application performance, unplanned downtime and an attack on your organization’s ERP platforms.

Engage