Enterprise software is complex due to its nature and interconnectivity to business processes. On top of that, software is created by humans, which means that vulnerabilities are inevitable. Those affect SAP technology will ultimately impact the business and should be properly managed from a risk perspective. This article, written by a cybersecurity expert, explains a critical vulnerability fixed by SAP and provides clear steps to address similar risks and vulnerabilities.
Read this article and learn:
- The evolution of SAP security notes;
- Recent examples of vulnerabilities, misconfigurations, and exploits affecting SAP applications today; and
- Steps to take to be proactive in your cybersecurity approach for SAP applications
MEET THE AUTHORS
JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world's biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.