Research Team

10 most unusual cyberattacks

While there are many common scenarios of breaches that include classic database thefts, ransomware, phishing or DoS, some hackers provide exceptional originality. Their imaginary can astonish you. Here is the list of top-10 most unusual cyberattacks of 2017.

Read more

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 10: Logging of Security Events

One of the most important aspects to ensure the PeopleSoft security is security event logging in place. In case of an incident (which is likely to happen since there are plenty of settings and it is difficult to control all of them), only the security audit that is configured correctly allows a company to discover the fact of an attack in due time and, perhaps, to respond to it. Besides, this security audit enables preventing cyberattacks in their early stages of collecting system data. If you collect events timely and analyze them with the help of techniques based on signature or machine learning for anomalies detection, you can both detect and prevent attacks quickly.

Read more

SAP Security for CISO. Part 15: SAP Code Security

The next topic to deal with after Segregation of Duties is SAP Code Security. It is a relatively new area of SAP Cybersecurity comparing to SoD, for example.

The information about ABAP Security first came to the public eye in 2002 and was devoted to an SAP virus. However, it is not the only problem of the customization brought by the usage of SAP to every client while trying to customize their SAP System to work in specific situations.

Read more