Securing SAP SuccessFactors – Protecting Human Capital

It goes without saying that your own organization’s most strategic cloud application is the most important cloud application when it comes to ensuring proper data protection. However, some clouds are different than ...
Blueliv’s Threat Context solution tracks different CVEs and maps them to cybercriminal activities.

The RECON Vulnerability and related TTPs

| | Blog, CVE, cybercrime, research, SAP
Key takeaways  CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization of this vulnerability would allow attackers to abuse internet-facing SAP systems in ...
SAP Concur’s Cloud Journey

SAP Concur’s Cloud Journey

| | aws, Contrast Security, SAP
Chutes and Ladders of Migrating to the Cloud & Securing Applications The journey of cloud migration isn’t a straight and narrow path, and enterprise DevSecOps teams generally use a variety of tools ...
Reduce the Burden Of Managing SAP With Enterprise Identity Management

Reduce the Burden Of Managing SAP With Enterprise Identity Management

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during an onboarding process, ...
c-suite

SAP CISO: Application Security Still Too Difficult

Many advances in application security have been made over the years, yet building and deploying secure applications remains a challenge for even the most well-heeled of organizations. Justin Somaini, chief information security ...