Cyber Security Threats: Why Detection Takes So Long
Cyber Security Threats: Why Detection Takes So Long

The recent Equifax data breach compromised consumer data on an almost unbelievable scale, exposing millions of Americans to the risk of identity theft for the rest of their lives. While notable for its size and severity, it’s just another notch […]

Talking To Your CISO About Cyber Security: A Guide For Board Members
Talking To Your CISO About Cyber Security: A Guide For Board Members

As data breaches fill the headlines, cyber security vulnerabilities and other security issues have become a hot topic within the boardroom. Companies are starting to understand that security is more than a set of boxes to check — it’s a […]

It Can’t Happen — the Risks of a Data Security Breach
It Can’t Happen — the Risks of a Data Security Breach

If your entire company’s value were converted into cash, and stored in a warehouse, how would you go about protecting it? You’d probably start with physical security — a reinforced structure, razor wire, and a secure entryway to prevent unauthorized […]

Accelerating an SAP Security Redesign
Accelerating an SAP Security Redesign

Executing an SAP security redesign is like fixing up a house. If the structure is sound, it makes sense to work with what you have — patch up the roof, knock out a wall here, add a room there, and […]

3 Data Center Security Threats that are Mitigated in the Cloud
3 Data Center Security Threats that are Mitigated in the Cloud

We understand why many companies still host onsite. It just feels safe. You have your own people supervising hosting and keeping an eye out for potential data center security threats. But in reality, keeping your IT onsite is usually more […]

Expert Insight: What is SAP Security?
Expert Insight: What is SAP Security?

SAP security is the set of tools and processes that controls what users can access inside an SAP landscape. Your SAP hosting environment contains lots of confidential information (such as financial records) and sensitive procedures (such as paying inventory) that […]

The Complete Guide to Outsourcing Managed Security Services
The Complete Guide to Outsourcing Managed Security Services

For most enterprises, there are only two security options: outsourcing or waiting around for disaster to strike. With the growing sophistication of hackers, the rapid adoption of new technologies and the ever-increasing complexity of regulatory compliance, almost no one has […]

How Secure is the Cloud?
How Secure is the Cloud?

If someone asked you “how safe is a community,” how would you respond? Would you ask what kind of community they mean, tell them about the community you live in, or just shrug your shoulders and say, “it depends?”   […]

Conceptos básicos de seguridad de SAP: lo que necesita saber
Conceptos básicos de seguridad de SAP: lo que necesita saber

Seguridad SAP, rige a qué datos y procesos pueden acceder los usuarios dentro de un entorno SAP. Típicamente, los usuarios tienen acceso suficiente para hacer su trabajo. Para entender los conceptos básicos de cómo funciona la seguridad de SAP, imagine […]

8 Cyber Security Vulnerabilities: Know Your Enemy
8 Cyber Security Vulnerabilities: Know Your Enemy

Anyone with a computer, an Internet connection and Google can hack. Hacking software is inexpensive (or free), easy to use and powerful enough to cause massive damage to your system — even in the hands of an inexperienced user.   […]

1 2 3