Blog

Valuable SAP Security Knowledge

The time has come for Zero Trust

As organizations are contemplating the idea of Zero Trust, it’s much more necessary now with the pandemic forcing more ‘work from home’ options. With no clear indication that the pandemic will end anytime soon, it is time for organizations to invest in Zero Trust.

Read more

10 Data Leaks that have cost even Fortune 500 companies a fortune (2020 Update)

Data is undoubtedly the most important element in an organization. Securing data during these testing pandemic times is a tightrope walk not just for data security heads, but for CEOs too. Here is a list of the top 10 data leaks that have cost Fortune 500 companies dearly – and how such tragedies can be averted.

Read more

4 Key takeaways for a cyber committed CEO to be Cyber Resilient

Traditional security measures are no longer adequate to reduce cyber risks and threats which are becoming more and more sophisticated. Organizations need a cyber resilience strategy that can protect against cyberattacks, offer adequate risk control for protecting information, and ensure continuity of operation even during a threat.

Read more

Cyber Security Transformation requires a Cyber Committed CEO

As enterprises rely more and more on digital technologies in all areas of business, and the attack surface grows, a broader security strategy is needed. Traditionally, enterprises have taken a bottom-up approach and IT department has been a separate entity. But today, what is needed is not just policies and procedures but a proper governance to keep information and data secure. That is why it is important to have a top-down approach and a cyber committed CEO.

Read more

Is collaboration the key to improving cybersecurity?

In today’s collaborative world, data is constantly on the move, traveling outside firewalls and organizational boundaries. A collaborative approach is needed to provide the most secure environment that can be least penetrated by hackers.

Read more

Why Data Security is Gaining Traction

The shift towards cloud storage has paved the way for more vulnerabilities and exposure risks. Cyber breaches and data cyber-attacks have increased the need for security measures. Moreover, new governmental and industrial norms have forced companies to think of data security. Learn more about how SECUDE can help you to provide a Zero Trust security solution for data extracted from SAP environment.

Read more

Zero Trust will be the New Normal

As the world fitfully rebounds from the recent Covid-19 pandemic, both our personal and professional lives will be altered. Today’s security approach must shift from unconditional confidence in users to zero trust fundamentals. Zero Trust along with Multi-factor Authentication, has become the new normal.

Read more

5 Telltale signs your business needs to evaluate Remote Proof of concept (POC)

SECUDE GARDEN is a self-service POC environment that eliminates steep capital costs and logistical pitfalls of traditional POCs and improves operational efficiency, remote usability, agility, and responsiveness.

Read more

How to protect your crown Jewels while working remotely

The crown Jewels, part of the Royal Collection, are the most powerful symbols of the British Monarchy. They are most valued and given tightened security protection to prevent from being stolen. Similarly, Mission-critical, intellectual property is an organization’s ‘crown jewels’ and would cause major business impact if compromised. Read more on how to protect your SAP crown jewels with a Zero Trust approach.

Read more

Beef up your IP Security with Zero Trust – 5 Guiding Principles to protect your IP effectively

Zero Trust is the new Buzz word in the cyber security arena. Ever since, Forrester Analyst, Kindervag introduced the term Zero Trust, traditional security measures have become obsolete. Learn more about the five guiding principles to consider before implementing a Zero Trust Architecture.

Read more

Is there Life in the Home office after Corona?

Read how the recent corona pandemic has pushed us into a forced home office and how to deal with it through a structured & goal-oriented approach.

Read more

Watch Out for Next-generation of cyber attack to hit us past the current Corona wave warns CEO and founder of SECUDE

Read why he says that, what it means for your company and how you can protect yourself .

Read more

Data theft in Switzerland: One-third of companies have been victims of industrial espionage

It is a fact that no one likes to talk about. Swiss companies are spied upon, their secrets revealed and their data sold. The damage can be humongous. There are many cases that remain under lock and key and rarely appear in the media.

Read more

Management Musings 2: Protecting evidence at the scene of crime

No crime is perfect. Every thief leaves behind a ‘signature’ – even in the digital world. But what if he tries to erase it and leave no trace behind? Can it be done? Is there a way to make sure that footprints cannot be erased? This is what Dr. Heiner Kromer has to say.

Read more

Management Musings 1: Pay attention to all data-centric security

What stops senior management from seriously considering data-centric security as an important aspect of their overall IT security paradigm? Are they misled? Or is it plain complacency that data breach would happen to them? This is what Dr. Heiner Kromer, CEO, SECUDE has to say.

Read more

The Biggest Data Leaks in the Past 15 Years

Marriott, Facebook, Instagram, First American Financial Corp, Capital One, Zoll Medical, Georgia Tech, Federal Emergency Management Agency (FEMA), and others. What’s common to them all? Well, they are all in the 2019 Data Loss Hall of Shame.

Read more

SECUDE gets featured in The Enterprise World Magazine

Organizations are increasingly becoming aware of the need focus on data security. SECUDE, after the sale of its immensely popular Single Sign-On module to SAP, is now gaining the attention of global companies and media for its unique data security products – HALOCORE and HALOCAD. The Enterprise World magazine recently caught up with SECUDE to feature the company in its magazine.

Read more

Data security in the media: A look on what it takes to plug the gaps beyond traditional DLP solutions

The world is slowly, but increasingly, taking cognizance of looking deeper within when it comes to protecting data. CNBC TV18 recently published an article by Utkarsh Morarka on the ‘why’ and ‘how’ of data security. This is SECUDE’s take on the article.

Read more

How to Secure your Design IP in your PLM environment

Design-intensive organizations leverage many types of security solutions to lessen, if not eradicate, loss of design data. While there are many solutions are deemed necessary due to the diversity of sharing systems, file formats, devices and locations, here is one solution that assures lifecycle-long protection of the CAD file – throughout the PLM cycle.

Read more

Do you use PTC Creo? Here’s how you can protect your CAD files leveraging your existing investment in Microsoft.

Product design is a long-winded process that involves multiple levels, applications and, importantly, stakeholders. More often than not, many important stakeholders would be from outside the organization – thus, sharing designs even before being patented may become a necessity. Obviously, design security is paramount. Is there a way to secure your design throughout its lifecycle without any major additional investments?

Read more

Enterprise-level data security: Big picture first; details foremost

Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.

Read more

Six Things to do to Get Your Data Stolen

Have you taken all the steps to throw your data into the winds? If not, you should read this blog post. Leaving your data to the wolves isn’t as easy as you think. Here’s why…

Read more

Now its Google. Are You Next?

British Airways, Apple Inc., Tesla… the list just keeps growing. The latest in this infamous line is none other than Google. Recently, former Google engineer Anthony Levandowski was accused of stealing self-driving car project details as he moved on to join Uber

Read more

Three Simple Tips to Keep Your CAD Files Safe and Secure

In the world of manufacturing and high-tech companies the most critical IP, like details of either mature products or yet-to-be patented prototypes, is represented as constructional drawings typically stored as CAD files. Cyber-committed CEOs understand that business continuity in digital processes requires new data-centric security strategies. Here are three important points for you to keep in mind when protecting your CAD files.

Read more

Serial data breach cases. When corporations know so much about you. Why don’t they protect your information?

They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.

Read more

Apple and Tesla Story Needn’t Be Yours

Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.

Read more

What is the first step towards data-centric security?

To be forewarned is to be forearmed. This popular truism cannot be truer when it comes to data-centric security. However, the key question often is: where does one begin? This brief blog presents a clear step forward towards data-centric protection.

Read more

Big Data + Small Gaps = Big Trouble

It is all about protecting your crown jewels. If you are an SAP user, you will be well aware of the security provided ‘inside’. But the key question is: what happens to the security of your data once they are downloaded or even shared with ‘legitimate’ outsiders? Can you ensure data integrity?

Read more

Protecting IP of a Manufacturing Company – A Case Study

IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. Here is the case study of a leading Swiss chip manufacturer who took the extra step of taking a data-centric approach beyond the standard security paradigm.

Read more

Five SAP data protection scenarios where HALOCORE must be considered

An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ability to power operations across departments by enabling seamless data sharing. However, data that is being shared may also be misused and stolen. Here are five SAP data protection scenarios where HALOCORE must be considered.

Read more

Five Types of Insiders who may steal your Company’s Data

Most CIOs and data security practitioners believe that traditional security measures such as firewalls, anti-virus and even password best practices are credible protection against data leaks and theft. The fact is that they are not – especially when the root of the problem could be the employee himself.

Read more

10 Data Leaks that have cost Fortune 500 companies a fortune

Losing data can be a painful–even disastrous– experience. Considering the following 10 data breaches, SECUDE suggests a proven solution to avert such tragedy in your organization.

Read more

Why CEOs Should Worry About Data Leaks

CEOs are aware that losing IP and data devastates brand, business reputation and finally the entire company. But only a few are committed to a cyber security strategy for protecting their digital assets. When the CEO’s skin is in the game why do they fall short?

Read more

How to ascertain suspected data leak from the IT landscape?

Wipro, the India-based IT giant, is in the news for a major breach of its systems. An advanced phishing attack has enabled hackers, possibly government sponsored, to use Wipro’s network to ‘listen’ to information exchanges with customers and external vendors. Is there a way to thwart data leaks right at the beginning? What should be done?

Read more

The Simple Printer: Innocuous Office Tool or Source of Silent Data Leak?

The innocuous office printer is a seemingly simple corporate device of everyday use. Despite stringent ‘go-green’ and ‘paperless office’ initiatives printing will continue to be. But what comes out needn’t be authorized printed documents. They may also be vital intellectual property or other sensitive information. It’s time IT Managers look beyond mere maintenance issues.

Read more

Close your SAP security gaps now and let business run.