Chinese most likely using one of top three most common SAP exploits, as identified by Onapsis, to compromise US agencies

The Hill publication reported on November 3, 2014 that Chinese hackers roamed around unnoticed for months inside the network of USIS, is the biggest commercial provider of background investigations to the federal U.S. government.[1] In fact, two of the company’s biggest customers were the Department of Homeland Security (DHS) and the Office of Personnel Management (OPM).

Oracle Critical Patch Update (CPU April 2015)

As a company, Onapsis is focused on the security of business-critical applications such as SAP and Oracle. While our focus is on SAP applications, we have been doing research on Oracle business applications as well to identify and report critical vulnerabilities. In this sense, Oracle is different from SAP in regards to the method and timing that security patches are released and available to end users.

Analyzing SAP Security Notes April 2015 Edition

SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business, or through the application of Security Notes (Patches) to ensure that newly disclosed vulnerabilities are mitigated. In order to provide a predictable and scheduled flow of vulnerability mitigation information and security patches, SAP releases the major part of their latest Security Notes information on the second Tuesday of every month.

2015 Onapsis Roadshow - Coming to a City Near You!

Today is an important day in Onapsis history. We’re officially kicking off the first annual Onapsis Roadshow series in North America. We have seen rapid growth in customers engaging Onapsis for our expertise in SAP cyber-security solutions. With a growing amount of customers leveraging our solutions, now is the time for us to bring our customers together in order to share best practices and build out their networks to make the most out of their investment with  Onapsis.

The Evolving SAP Cyber-Security Landscape

$1.3 billion lost an hour!  This is what one of our global customer’s estimates is the impact to their business if their SAP systems become compromised and operations are disrupted.  The cost of an SAP breach can be inconceivable. And yet, it may be one of the most under scrutinized areas in IT security from a business continuity perspective.  Everyday our services team sees the real-world impact of breaches to organization’s SAP systems.

Pages

Subscribe to our monthly newsletter, the Defender's Digest!