SAP Security: Know Your Risks
SAP Security: Know Your Risks

Your business runs on data, and your SAP implementation is critical to keeping your business running. Consequently, you want to lock it down and make it impervious to attacks. The problem is that you also need it to be open […]

Meltdown and Spectre: What you need to know
Meltdown and Spectre: What you need to know

Massive security issues have been announced today, grabbing the attention of technology executives everywhere.  “Meltdown” and “Spectre” are essentially bugs responsible for leaking sensitive data by exploiting vulnerabilities in modern processors. These are found at a fundamental level and allow […]

Cyber Security Threats: Why Detection Takes So Long
Cyber Security Threats: Why Detection Takes So Long

The recent Equifax data breach compromised consumer data on an almost unbelievable scale, exposing millions of Americans to the risk of identity theft for the rest of their lives. While notable for its size and severity, it’s just another notch […]

Talking To Your CISO About Cyber Security: A Guide For Board Members
Talking To Your CISO About Cyber Security: A Guide For Board Members

As data breaches fill the headlines, cyber security vulnerabilities and other security issues have become a hot topic within the boardroom. Companies are starting to understand that security is more than a set of boxes to check — it’s a […]

It Can’t Happen — the Risks of a Data Security Breach
It Can’t Happen — the Risks of a Data Security Breach

If your entire company’s value were converted into cash, and stored in a warehouse, how would you go about protecting it? You’d probably start with physical security — a reinforced structure, razor wire, and a secure entryway to prevent unauthorized […]

Accelerating an SAP Security Redesign
Accelerating an SAP Security Redesign

Executing an SAP security redesign is like fixing up a house. If the structure is sound, it makes sense to work with what you have — patch up the roof, knock out a wall here, add a room there, and […]

3 Data Center Security Threats that are Mitigated in the Cloud
3 Data Center Security Threats that are Mitigated in the Cloud

We understand why many companies still host onsite. It just feels safe. You have your own people supervising hosting and keeping an eye out for potential data center security threats. But in reality, keeping your IT onsite is usually more […]

Expert Insight: What is SAP Security?
Expert Insight: What is SAP Security?

SAP security is the set of tools and processes that controls what users can access inside an SAP landscape. Your SAP hosting environment contains lots of confidential information (such as financial records) and sensitive procedures (such as paying inventory) that […]

The Complete Guide to Outsourcing Managed Security Services
The Complete Guide to Outsourcing Managed Security Services

For most enterprises, there are only two security options: outsourcing or waiting around for disaster to strike. With the growing sophistication of hackers, the rapid adoption of new technologies and the ever-increasing complexity of regulatory compliance, almost no one has […]

How Secure is the Cloud?
How Secure is the Cloud?

If someone asked you “how safe is a community,” how would you respond? Would you ask what kind of community they mean, tell them about the community you live in, or just shrug your shoulders and say, “it depends?”   […]

1 2 3