Defense and Security
64
Blog Posts
42 Contributors
-
Technological advancement has had, undoubtedly, many positive impacts for humanity, but it raises complicated questions in the context of increasing global unrest and the changing nature of warfare, national security and international dispute... Read More »0Comments0Likes -
Thanks to the SAP devX external conferences program I had the opportunity to attend virtually the BlackHat USA conference. Together with DefCon, BlackHat is one the most advanced and exciting conference on offensive and defensive security that a... Read More »0Comments4Likes -
There are some user authentication mechanisms in SAP (ABAP systems). One of them – using classical user passwords. Yes, there are modern technics using certificates, tokens, SSO and so on. All of these methods are more complicated and requires... Read More »0Comments3Likes -
The SAP Road Map Explorer was recently released to help SAP customers customize road maps according to their needs. In 5 simple steps, customers can navigate the tool in an easy and intuitive way. To first access the tool, log-in with your S-user... Read More »3Comments9Likes -
The new generation of road maps is here at SAP! Similar to how paper maps were reshaped by navigation systems and digital maps, classic PDF road maps are being transformed by the SAP Road Map Explorer. This interactive tool helps customers and... Read More »0Comments15Likes -
Image by Stefan Coders from Pixabay.com Recent research has revealed that many VPNs currently installed on Android and iOS are infested with malware of all kinds. From Trojans, spyware, riskware and adware programs, users face all kinds of risks.... Read More »1Comment2Likes -
With digital transformation and an increase in usage of smartphones, people mostly prefer to do business online. Be it shopping or banking, it is more convenient to sit home and do stuff without physically visiting a bank or a store. Owing to this... Read More »0Comments0Likes -
By Ming Chang – Cloud Information Security Awareness Americas Lead Ariba just like other acquired solutions, it may require different configurations to keep it secure. In Chapter 1 of Security for SAP Cloud Systems, I’ve... Read More »0Comments1Like -
My journey at BlackHat Black Hat Europe, taking place from 2nd until 5th of December in London, is the yearly unmissable event for security experts interested in discovering new offensive and defensive IT security trends. During the event... Read More »0Comments1Like -
Cybersecurity is everyone’s business. Nevertheless, at the end of 2019, we (as well as the cybersecurity field in general) still have a lack of diversity in this vibrant field. By diversity, we mean all: cultural background, educational... Read More »3Comments11Likes