
5 IGA Features That Every SMB Needs
How to choose a modern identity governance solution that’s quick to deploy, easy to manage, and delivers rapid time to value Small and medium-sized businesses […]
Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP/2
On July 11th, 2023, following a continued monthly cadence of security patches, SAP released patches for two new vulnerabilities (CVE-2023-33987 and CVE-2023-35871), which affect one […]
SAP Security Patch Day: July 2023
Important Patches for IS-OIL, Solution Manager, Web Dispatcher, and ICM Highlights of July SAP Security Notes analysis include: July Summary – Eighteen new and updated […]
ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system
ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and […]
Why Multi-Cloud Resilience Is More Challenging Than It Seems
When the public cloud was first launched, it revolutionized the way businesses approached their data. But it would be years before hybrid- and multi-cloud strategies […]
SAP Remote Function Call (RFC) Vulnerabilities in 2023
In 2007, Onapsis CEO & Co-founder Mariano Nuñez presented several vulnerabilities and attacks affecting the RFC Protocol at Black Hat Europe. That presentation became a […]
PCI DSS 4.0: What You Need to Know
In today’s digital landscape, where electronic payments have become the norm, protecting sensitive cardholder data has become paramount. With cyber threats lurking at every corner, […]
Onapsis Partners with SNOPUD to Secure Critical SAP Applications, Strengthening its Leadership in the Utilities Sector
Onapsis will help SNOPUD deliver uninterrupted services to 373,000 energy customers and 23,000 water customers Onapsis today announced that it has partnered with Snohomish County […]
E-BOOK: Changing the Nature of Enterprise Data for Security, Privacy, and Resilience
In the transition from perimeter-protected networks to hybrid multi-cloud infrastructures, companies must carefully review their policies around sensitive data. This process can be challenging, especially […]
How to Securely Introduce Explicit AUTHORITY-CHECKS into Custom RFC-Enabled Function Modules
Compliance Aspects Every SAP application provides business-related authorization objects that clearly define specific activities for individual business entities. They are designed to easily fulfill and […]
ShardSecure Announces Allowance of Pivotal US Patent Application
ShardSecure, a leading provider of cloud data security and resilience software, is pleased to announce its receipt of a Notice of Allowance related to our […]
How to Manage Privileges in Endpoints?
If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not […]
How Data Loss Protection Is Outpacing Traditional DLP
Data loss or data leak prevention (DLP) is a well-known approach for detecting and preventing the loss, leakage, or misuse of data through unauthorized access, breaches, and […]
SAP Security Patch Day June 2023
Cross-Site Scripting Never Gets Old Highlights of June SAP Security Notes analysis include thirteen new and updated SAP security patches released, including four High Priority […]
What the Google SQL Flaw Tells Us About Data Access in the Cloud
Last month, we saw yet another high-profile case of cloud administrators being able to access confidential data. This time, it was a security flaw in […]
Is Secure and Trusted AI Possible? The EU Leads the Way
The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]
