This article is the beginning of a series of articles “SAP HANA for Dummies” devoted to the review of the main features and security issues of SAP HANA. We will consider the key aspects of the system itself, its security and also we will pay attention to vulnerabilities of its several modules.Read more..
We continue to familiarize you with PeopleSoft security aspects and share the latest research directly from our lab, hot and tasty. The topic of today’s research is …
Passwords! Right, it’s a never-ending topic. I will describe how to decrypt PeopleSoft application-specific passwords for fun and profit.
The SAP threat landscape is always growing thus putting organizations of all sizes and industries at risk of cyberattacks. The idea behind SAP Cyber Threat Intelligence report is to provide an insight into the latest security threats and vulnerabilities.
- October 24, 2017
- 10:00 (PDT)
- October 24, 2017
- 10:00 (CEST)
It’s no secret that where there’s money, there are malefactors as well. That’s why the majority of security incidents in retail are related to credit card fraud. In this webinar, we will describe how attackers can exploit Point of Sale and Point of Purchase systems.Read more..
Cybersecurity Falls Short In September
We continue describing categories from the list that we discussed in our Introduction to Secure ABAP Development Guide and pursue “Injections”, a type of vulnerabilities occurs when an application provides no or a bad user input validation. An attacker can inject malicious data, thus performing non-intended actions in a system. Such vulnerability may result in the major SAP risks (Espionage, Sabotage, and Fraud).
The Vulnerabilities Of A POS System
in Forbes by Alexander Polyakov
You already know enough about SAP ERP Security and realize a real impact of having insecure SAP implementation.
Recently, Crowd Research Partners have released ERP Cybersecurity Survey 2017 conducted across almost 2000 respondents of different roles from various industries. According to this research, 89% of security professionals predict that the number of attacks on SAP systems will increase. Moreover, the average damage of an SAP Security breach is estimated at $5 million. It’s unthinkable, isn’t it?
Palo Alto, CA – September 27, 2017 – ERPScan, the world-renowned provider of cybersecurity solutions for ERP systems, announces that its blog focused on cybersecurity aspects of ERP systems such as SAP and Oracle has been selected 11th by Feedspot in the list of Top 100 ERP Blogs on the web.