Defense and Security
74 Blog Posts
44 Contributors
-
Techno-Fogeys Episode 3 We hear many things about the #Metaverse, a world where virtual things, digital humans, cryptocurrencies and the creator economy will thrive. With Roblox having 202 active monthly users and seeing 40% growth year on year,... Read More »0Comments0Likes
-
If you are looking for more knowledge in context of SAP Defense & Security Industry please have a look at the SAP for Defense & Security Learning Journey. SAP Learning Journeys are structured visual guides, designed to help you understand... Read More »0Comments2Likes
-
Govt Cloud is Complicated https://TechnoFogeys.podbean.com/e/government-cloud-it-s-complicated/ With many industries accelerating their adoption of cloud. For Government, there are many challenges for a slower path. Understanding these challenges... Read More »1Comment1Like
-
The term “Factory to Foxhole”, was born from the US Department of Defense’s focus to accelerate supply chain responsiveness and improve logistics based on lessons learned from Operation Iraqi Freedom in 2003 where some units that were... Read More »0Comments2Likes
-
Image Source: Pixabay What Is Zero Trust? Zero trust is a strategy that helps stop successful information breaches by removing the idea of trust from the network architecture of an organization. Founded in the concept of don’t trust, always... Read More »0Comments2Likes
-
As a contribution to Cybersecurity Awareness Month 2021, I wanted to share my thoughts on its importance and how security organizations not known to be cyber-focused are significant contributors to our cyber security posture. When the US Department... Read More »1Comment1Like
-
Here’s another magic lesson. Today we will focus on the SAP_ALL profile. This profile contains all SAP authorizations (in ABAP systems), meaning that a user with the SAP_ALL profile can perform any action in the system. That’s why SAP... Read More »5Comments18Likes
-
I continue my posts regarding secret knowledge of SAP Consulters to bypass your security. And today I will tell you about calling SAP transactions without authorizations for them. It is known that to invoke transaction codes users need the S_TCODE... Read More »2Comments7Likes
-
For defense organizations worldwide, acquiring integrated logistics support (ILS) data from their OEMs has become a largely routine process. Most governments have established or adopted standards and specifications for defense OEMs to format and... Read More »0Comments3Likes
-
As you may know there are some basic rules in SAP Security. One of them is to prohibit direct modifications in production systems. All changes in SAP system have to be first implemented in the development system and then could be promoted through... Read More »2Comments8Likes