SAP HANA Security: Do You Want a Basic or Secure Implementation?
Different software companies take different approaches to the security of their products after they have been sold to their customers. Some would prefer it if previously released software had no...
View ArticleHow Malware is evolving into the first step of attacks against SAP systems
When I talk to CISOs and other business leaders who are responsible for critical applications that rely on SAP a common question I get is how I would quantify the threat to their SAP systems. We talk...
View ArticleAnalyzing SAP Security Notes March 2014 Edition
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or applying Security Notes (Patches) to ensure that newly...
View ArticleAnalyzing SAP Security Notes April 2014 Edition
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or through the application of Security Notes (Patches) to ensure...
View ArticleAssessing HANA Systems Against the SAP HANA Security Guide
SAP takes their responsibility to help their customers be secure seriously. They have released the SAP HANA Security Guide to help their customers deploy HANA in a secure way. SAP Security Guides are...
View ArticleAnalyzing SAP Security Notes May 2014 Edition
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or through the application of Security Notes (Patches) to ensure...
View ArticleAnalyzing SAP Security Notes June 2014 Edition
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or through the application of Security Notes (Patches) to...
View ArticleAnalyzing SAP Security Notes August 2014 Edition
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or applying Security Notes (Patches) to ensure that newly...
View ArticleSAP HANA post exploitation vectors
This week the Onapsis Research Labs released an advisory for a server-side code injection vulnerability in SAP HANA integrated IDE. For more information about the SAP Note that fixes this issue, please...
View Article
More Pages to Explore .....