From prevention to real-time detection SAP cybersecurity (or platform security) follows a certain maturity roadmap. The first step is prevention. A large majority of SAP…
when preventing and detecting SAP cybersecurity attacks The sooner you catch an intruder in your network, the better. Attackers can stay undetected in your network…
Keep an eye on Text4Shell On October 13th 2022, CVE-2022-42889 was released, which is also known as “Text4Shell”. This is a vulnerability in the popular…
A review, best practices and tips and tricks for this months’ SAP Security patches Another month, another SAP Security Patch Tuesday! The 2nd Tuesday in…
Last week, an exploit has been released that can be used to exploit a critical vulnerability in SAP systems. This vulnerability, concerning CVE-2020-620, is a bug…
Facing the Internet and Often Vulnerable: SAP Web Dispatcher Situated on the edge of company IT infrastructures, often located in the area called the demilitarized…
We all know the Where’s Waldo/Where's Wally books and graphics where Waldo/Wally in his red-striped shirt and red-striped hat is hiding in plain sight to…