SAP-Solution: Cybercrime
August 2, 2023
Cyberattacks on SAP systems and operational technology (OT) can have devastating consequences for companies: from delays in operations to the shutdown of all processes. The following tricks help to ward off hackers.
July 4, 2023
The good news: The productive SAP systems survived all the auditors' checks and drove the penetration testers to despair. And then: An attacker hijacked the highly secure system.
June 7, 2023
Production lines are indispensable components of complex supply chains. If these are disrupted, this can jeopardize the existence of the companies affected. What can companies do to prevent hackers from "hitting the wall" at OT?
28 March 2023
The security precautions that IT organizations have taken are not sufficient at the back and front. The measures taken so far simply do not lead to sufficient resilience
March 15, 2023
More and more public authorities and companies are taking the plunge into the cloud. However, successful and sustainable digitization with the help of cloud computing cannot work without a cloud strategy including GRC management.
March 9, 2023
Increasing digitization of processes is inevitable for German companies. In this context, vulnerability management is becoming increasingly complex and, not least, more confusing due to shadow IT.
21 December 2022
Defending against cyberattacks on SAP systems means more than just protecting the ERP system alone. The threat potential of networked companies and hybrid SAP landscapes requires a holistic approach.
November 9, 2022
Phishing attacks are among the greatest threats to IT security. A targeted reduction of the vulnerabilities that cybercriminals use to gain access to their victim's system is called for.
12 October 2022
SAP is part of the indispensable basic IT equipment for many companies because it is absolutely essential for smooth business operations and trouble-free production. But why don't companies protect their SAP systems properly?
April 11, 2022
REvil was one of the most prolific ransomware-as-a-service campaigns in recent memory. Its victims included thousands of companies worldwide. How did its success come about?
August 13, 2020
Cyber attacks range from manual hacking and phishing activities to the use of ransomware and malware to CEO fraud. However, remedies for many attacks have been available for a long time.
June 13, 2019
Older semesters may still remember the first global virus with the friendly e-mail signature "I Love You". A short time later, I spoke with Gerd Oswald, then a member of the SAP Executive Board, at a European Sapphire in Nice, France, about the virus threat in SAP systems.






