How to approach? The HTTP protocol is widely used for client-server communication and SAP environments are no exception. Think for example about end-user devices that…
43% of all data breaches involve small and medium-sized businesses (including those running SAP). There are many statistics on security and security breaches. And to be…
Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher In SAP’s patch round of February 2022, an SAP Security…
Organizations that run SAP also need to improve their cyber resilience with the cyber threat heightened Following Russia’s unprovoked, premeditated attack on Ukraine, several National…
And why you need automation… Securing SAP systems is a lot of work and involves many different teams with different skillsets, from management to tech-teams…
This new directive underlines the risk posed by Log4j vulnerabilities To stress the importance of the vulnerabilities found in Log4j, the Cybersecurity and Infrastructure Security…