English News

5 IGA Features That Every SMB Needs

5 IGA Features That Every SMB Needs

How to choose a modern identity governance solution that’s quick to deploy, easy to manage, and delivers rapid time to value Small and medium-sized businesses […]
Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP/2

Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP/2

On July 11th, 2023, following a continued monthly cadence of security patches, SAP released patches for two new vulnerabilities (CVE-2023-33987 and CVE-2023-35871), which affect one […]
SAP Security Patch Day: July 2023

SAP Security Patch Day: July 2023

Important Patches for IS-OIL, Solution Manager, Web Dispatcher, and ICM Highlights of July SAP Security Notes analysis include: July Summary – Eighteen new and updated […]
ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system

ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system

ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and […]
Why Multi-Cloud Resilience Is More Challenging Than It Seems

Why Multi-Cloud Resilience Is More Challenging Than It Seems

When the public cloud was first launched, it revolutionized the way businesses approached their data. But it would be years before hybrid- and multi-cloud strategies […]
SAP Remote Function Call (RFC) Vulnerabilities in 2023

SAP Remote Function Call (RFC) Vulnerabilities in 2023

In 2007, Onapsis CEO & Co-founder Mariano Nuñez presented several vulnerabilities and attacks affecting the RFC Protocol at Black Hat Europe. That presentation became a […]
PCI DSS 4.0: What You Need to Know

PCI DSS 4.0: What You Need to Know

In today’s digital landscape, where electronic payments have become the norm, protecting sensitive cardholder data has become paramount. With cyber threats lurking at every corner, […]
Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector

Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector

Onapsis will help SNOPUD deliver uninterrupted services to 373,000 energy customers and 23,000 water customers Onapsis today announced that it has partnered with Snohomish County […]
E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience

E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience

In the transition from perimeter-protected networks to hybrid multi-cloud infrastructures, companies must carefully review their policies around sensitive data. This process can be challenging, especially […]
How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules

How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules

Compliance Aspects Every SAP application provides business-related authorization objects that clearly define specific activities for individual business entities. They are designed to easily fulfill and […]
ShardSecure Announces Allowance of Pivotal US Patent Application

ShardSecure Announces Allowance of Pivotal US Patent Application

ShardSecure, a leading provider of cloud data security and resilience software, is pleased to announce its receipt of a Notice of Allowance related to our […]
How to Manage Privileges in Endpoints?

How to Manage Privileges in Endpoints?

If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not […]
How Data Loss Protection Is Outpacing Traditional DLP

How Data Loss Protection Is Outpacing Traditional DLP

Data loss or data leak prevention (DLP) is a well-known approach for detecting and preventing the loss, leakage, or misuse of data through unauthorized access, breaches, and […]
SAP Security Patch Day June 2023

SAP Security Patch Day June 2023

Cross-Site Scripting Never Gets Old Highlights of June SAP Security Notes analysis include thirteen new and updated SAP security patches released, including four High Priority […]
What the Google SQL Flaw Tells Us About Data Access in the Cloud

What the Google SQL Flaw Tells Us About Data Access in the Cloud

Last month, we saw yet another high-profile case of cloud administrators being able to access confidential data. This time, it was a security flaw in […]
Is Secure and Trusted AI Possible? The EU Leads the Way

Is Secure and Trusted AI Possible? The EU Leads the Way

The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]