The Onapsis Security Blog

El mundo de la seguridad y el cumplimiento de aplicaciones esenciales para el negocio es dinámico, donde se producen nuevos avances continuamente. Lea nuestras publicaciones de blog posts para conocer recomendaciones, ideas y observaciones sobre las últimas novedades para proteger sus aplicaciones de SAP® y de Oracle.

Thumbnail
January '20 Oracle CPU Analysis: Oracle fixes a critical vulnerability that can lead to financial fraud

January '20 Oracle CPU Analysis: Oracle fixes a critical vulnerability that can lead to financial fraud

Today Oracle released the first Critical Patch Update of the year that contains 334 new security patches and a total of 23 patches for Oracle E-Business Suite (EBS), one of the most used ERP software in the World. Among these fixes, the two most critical ones were reported by Onapsis Research Labs and are related to the already known PAYDAY vulnerabilities that we explained a few months ago in a public report.

Thumbnail
2019 Year in Review Partners

2019 Year in Review for Onapsis Partners

2019 was an incredible year for Onapsis, with significant growth enabled with strategic partnerships, fueled by the acquisition of Virtual Forge and supported by our growing customer base. Thank you to all our partners for being a part of our continued success, and thank you for working with Onapsis to provide enterprises with comprehensive protection for their SAP and Oracle platforms.
Thumbnail
Securing Your Sap and Securing the Security of Your Sap

Securing Your Sap and Securing the Security of Your Sap

In June 2019, one month after the advisory from US-CERT regarding 10KBlaze, csoonline.com published an interview with Juan Perez-Etchegoyen, CTO of Onapsis, Jonathan Haun, senior director at Enowa LLC, and Gert Schroeter, vice president of security communications at SAP Global Security. In this interview they explained eight of the top most common configuration errors and security failures within enterprise SAP environments.

Solicitud de cortesía
Ilustración de Riesgos de Negocios

Examine la postura de seguridad y la exposición al riesgo de sus aplicaciones críticas para el negocio a fin de determinar el impacto potencial de un ataque cibernético en su organización.

Actúe