
What is Continuous Threat Exposure Management (CTEM) and why should you care?
In times when businesses are embracing digital transformation at a pace faster than one can fathom, exposure management becomes a crucial element to effectively address […]

Red Sift’s OnDOMAIN launches first GPT-4 powered feature, Relevance Detection
Relevance Detection is an AI-powered feature that automatically classifies the significance of identities found across sources such as DNS, WHOIS info, SSL certificates, and many […]

Why Multi-Cloud Resilience Is More Challenging Than It Seems
When the public cloud was first launched, it revolutionized the way businesses approached their data. But it would be years before hybrid- and multi-cloud strategies […]

SAP Remote Function Call (RFC) Vulnerabilities in 2023
In 2007, Onapsis CEO & Co-founder Mariano Nuñez presented several vulnerabilities and attacks affecting the RFC Protocol at Black Hat Europe. That presentation became a […]

PCI DSS 4.0: What You Need to Know
In today’s digital landscape, where electronic payments have become the norm, protecting sensitive cardholder data has become paramount. With cyber threats lurking at every corner, […]

Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector
Onapsis will help SNOPUD deliver uninterrupted services to 373,000 energy customers and 23,000 water customers Onapsis today announced that it has partnered with Snohomish County […]

E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience
In the transition from perimeter-protected networks to hybrid multi-cloud infrastructures, companies must carefully review their policies around sensitive data. This process can be challenging, especially […]

How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules
Compliance Aspects Every SAP application provides business-related authorization objects that clearly define specific activities for individual business entities. They are designed to easily fulfill and […]

ShardSecure Announces Allowance of Pivotal US Patent Application
ShardSecure, a leading provider of cloud data security and resilience software, is pleased to announce its receipt of a Notice of Allowance related to our […]

How to Manage Privileges in Endpoints?
If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not […]

How Data Loss Protection Is Outpacing Traditional DLP
Data loss or data leak prevention (DLP) is a well-known approach for detecting and preventing the loss, leakage, or misuse of data through unauthorized access, breaches, and […]

SAP Security Patch Day June 2023
Cross-Site Scripting Never Gets Old Highlights of June SAP Security Notes analysis include thirteen new and updated SAP security patches released, including four High Priority […]

What the Google SQL Flaw Tells Us About Data Access in the Cloud
Last month, we saw yet another high-profile case of cloud administrators being able to access confidential data. This time, it was a security flaw in […]

Is Secure and Trusted AI Possible? The EU Leads the Way
The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]

China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan
Recent tensions between China and Taiwan have been escalating due to China’s increasing military presence and provocative actions in the region. China has long claimed […]

MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks
A zero-day vulnerability affecting MOVEit Transfer has been reported being actively exploited by hackers worldwide. MOVEit Transfer is a popular file transfer program developed by […]