Security
1585 Blog Posts
638 Contributors
-
Secure coding is the practice of writing code in a way that reduces the likelihood of introducing vulnerabilities or weaknesses that could be exploited by attackers. Secure coding is essential in the development of software and applications, as... Read More »0Comments0Likes
-
The energy and water sectors are two of the 16 critical infrastructure sectors the U.S. government labels as vital, noting that “their incapacitation or destruction would have a debilitating effect on security, national economic security, national... Read More »0Comments2Likes
-
This blog post tries to explain in simple words the PKCS #7 and CMS Standards and its relevance for SAP Cloud Integration (CPI). SAP Cloud Integration provides functionality to automatically add security features to our messages (so-called... Read More »2Comments12Likes
-
Transporting BPC profiles is a tedious process than the one we usually follow for FIORI and PFCG roles. *Never transport BPC profiles through PFCG. ** BPC auto generated role for Teams or profiles can differ in name in different environments in same... Read More »0Comments1Like
-
As SAP HANA Cloud is a modern database as a service (DBaaS), the end users can access SAP HANA Cloud from anywhere with public internet, whether that’s at home, in the office, or even at a third space like a coffee shop. When an organization wants... Read More »2Comments5Likes
-
When dealing with Cloud Integration and specifically inbound requests and messaging processing, sometimes an http error is occurring. To help customers to quickly address these issues, we have released few resources to help our customers on knowing... Read More »2Comments6Likes
-
From my experience the RFC Gateway security is for many SAP Administrators still a not well understood topic. As a result many SAP systems lack for example of proper defined ACLs to prevent malicious use. After an attack vector was published in a... Read More »0Comments3Likes
-
(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and has been recognized as a Fellow of Information Privacy (FIP) by the International Association of Privacy Professionals (IAPP). As part of his responsibilities,... Read More »2Comments10Likes
-
Cybersecurity automation and orchestration is an innovative approach to cybersecurity risk management that involves automating routine cybersecurity tasks and using orchestration to coordinate responses to cyber incidents. This approach can help... Read More »0Comments1Like
-
It used to be a simple text editor for JSON inputs. Then, it was enhanced with syntax coloring, syntax validation and autocompletion. Now, it is evolved into a full-blown, beautiful, and easy-to-use graphical editor. A warm welcome to the latest... Read More »2Comments18Likes