English News

What is Continuous Threat Exposure Management (CTEM) and why should you care?

What is Continuous Threat Exposure Management (CTEM) and why should you care?

In times when businesses are embracing digital transformation at a pace faster than one can fathom, exposure management becomes a crucial element to effectively address […]
Red Sift’s OnDOMAIN launches first GPT-4 powered feature, Relevance Detection

Red Sift’s OnDOMAIN launches first GPT-4 powered feature, Relevance Detection

Relevance Detection is an AI-powered feature that automatically classifies the significance of identities found across sources such as DNS, WHOIS info, SSL certificates, and many […]
Why Multi-Cloud Resilience Is More Challenging Than It Seems

Why Multi-Cloud Resilience Is More Challenging Than It Seems

When the public cloud was first launched, it revolutionized the way businesses approached their data. But it would be years before hybrid- and multi-cloud strategies […]
SAP Remote Function Call (RFC) Vulnerabilities in 2023

SAP Remote Function Call (RFC) Vulnerabilities in 2023

In 2007, Onapsis CEO & Co-founder Mariano Nuñez presented several vulnerabilities and attacks affecting the RFC Protocol at Black Hat Europe. That presentation became a […]
PCI DSS 4.0: What You Need to Know

PCI DSS 4.0: What You Need to Know

In today’s digital landscape, where electronic payments have become the norm, protecting sensitive cardholder data has become paramount. With cyber threats lurking at every corner, […]
Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector

Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector

Onapsis will help SNOPUD deliver uninterrupted services to 373,000 energy customers and 23,000 water customers Onapsis today announced that it has partnered with Snohomish County […]
E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience

E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience

In the transition from perimeter-protected networks to hybrid multi-cloud infrastructures, companies must carefully review their policies around sensitive data. This process can be challenging, especially […]
How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules

How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules

Compliance Aspects Every SAP application provides business-related authorization objects that clearly define specific activities for individual business entities. They are designed to easily fulfill and […]
ShardSecure Announces Allowance of Pivotal US Patent Application

ShardSecure Announces Allowance of Pivotal US Patent Application

ShardSecure, a leading provider of cloud data security and resilience software, is pleased to announce its receipt of a Notice of Allowance related to our […]
How to Manage Privileges in Endpoints?

How to Manage Privileges in Endpoints?

If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not […]
How Data Loss Protection Is Outpacing Traditional DLP

How Data Loss Protection Is Outpacing Traditional DLP

Data loss or data leak prevention (DLP) is a well-known approach for detecting and preventing the loss, leakage, or misuse of data through unauthorized access, breaches, and […]
SAP Security Patch Day June 2023

SAP Security Patch Day June 2023

Cross-Site Scripting Never Gets Old Highlights of June SAP Security Notes analysis include thirteen new and updated SAP security patches released, including four High Priority […]
What the Google SQL Flaw Tells Us About Data Access in the Cloud

What the Google SQL Flaw Tells Us About Data Access in the Cloud

Last month, we saw yet another high-profile case of cloud administrators being able to access confidential data. This time, it was a security flaw in […]
Is Secure and Trusted AI Possible? The EU Leads the Way

Is Secure and Trusted AI Possible? The EU Leads the Way

The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]
China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

Recent tensions between China and Taiwan have been escalating due to China’s increasing military presence and provocative actions in the region. China has long claimed […]
MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

A zero-day vulnerability affecting MOVEit Transfer has been reported being actively exploited by hackers worldwide. MOVEit Transfer is a popular file transfer program developed by […]