Germany seems to be in the news for wrong reasons. The country paid its first GDPR fine recently. Now a major data breach in the country has potential to create a political furor. It is time the political, the public and all classes in between take a serious look at data security.
Cyber security companies and the US Department of Homeland Security warn of an increasing number of hidden hacker attacks on vulnerable SAP and Oracle applications which provide unrestricted access to systems.
Over a month ago the data protection authority of Baden-Württemberg imposed the first fine for violation of GDPR. This clearly means that companies’ honeymoon period is over. It is time they pull up their socks and get to work in meeting the regulation’s requirements.
The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?
SECUDE highlights participants on the urgent need to look into application-level security of their SAP system and holds meaningful conversation with eminent participants at the event.
HALOCORE 5.1 is based on new, powerful rules and configuration templates (available for SAP solutions for financial and HR functions) to easily meet classification and reaction requirements, even in complex use cases. The new engine also provides the foundation for forthcoming automation initiatives that incorporate machine learning concepts.
PII of around 500 million(!) guests at Marriott hotels has been compromised. The cause of this is due to unauthorized access within its network since 2014. Could this have been averted as early as 2010 when it switched to SAP ERP?
The recent arrest of a BrahMos Aerospace engineer highlights the need for organizations, private and government-run, dealing with sensitive military technologies to up their data security best practices. When it comes to national security, best may not be best enough.
Outsider threats, while still an important consideration in cyber security, account for only 40% of malicious attacks on your system while 60% potentially come from trusted insiders. Here are 4 important steps to keep in mind.
SAP customers are concerned about identification of data in the SAP system, their pseudonymisation in copies of the production system, and timely information, blocking and finally deletion of user data. This is what users should keep in mind.