SAP
Securing SAP SuccessFactors – Protecting Human Capital
It goes without saying that your own organization’s most strategic cloud application is the most important cloud application when it comes to ensuring proper data protection. However, some clouds are different than ...
The RECON Vulnerability and related TTPs
Key takeaways CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization of this vulnerability would allow attackers to abuse internet-facing SAP systems in ...
SAP Concur’s Cloud Journey
Chutes and Ladders of Migrating to the Cloud & Securing Applications The journey of cloud migration isn’t a straight and narrow path, and enterprise DevSecOps teams generally use a variety of tools ...
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during an onboarding process, ...
SAP CISO: Application Security Still Too Difficult
Many advances in application security have been made over the years, yet building and deploying secure applications remains a challenge for even the most well-heeled of organizations. Justin Somaini, chief information security ...

