SAP Enterprise Threat Detection
93 Blog Posts
43 Contributors
-
A total of more than 4,100 publicly disclosed data breaches occurred in 2022, resulting in the exposure of approximately 22 billion records. 14 new ransomware groups target organizations worldwide. Since Jan 2023 to July 2023 approx. 2700+... Read More »0Comments1Like
-
FAIR Methodology (Factor Analysis of Information Risk) for Risk Quantification In today’s digitally driven world, organizations of all sizes and industries face the pervasive threat of cyberattacks. With businesses relying increasingly on... Read More »0Comments6Likes
-
Post-COVID, the cyber threat landscape has undergone a seismic shift as cybercriminals take advantage of vulnerabilities created by the pandemic. This evolving threat landscape has been highlighted by many organizations in their recent research and... Read More »4Comments4Likes
-
One of the first known cases of a cyber-attack to critical infrastructures was the power outage in Ukraine, which left over 225,000 people without electricity for several hours. Cybersecurity has evolved significantly in today’s... Read More »0Comments4Likes
-
Why your organization should take care: Maintaining the security of installed SAP software is of critical strategic importance for the continuous protection of SAP business applications to defend against new types of cyber attacks and to close... Read More »0Comments1Like
-
The energy and water sectors are two of the 16 critical infrastructure sectors the U.S. government labels as vital, noting that “their incapacitation or destruction would have a debilitating effect on security, national economic security, national... Read More »0Comments4Likes
-
SAP Enterprise Threat Detection is a security tool that helps organizations identify and respond to potential threats to their SAP systems. It uses machine learning algorithms to analyze system behavior and detect anomalies that could indicate... Read More »0Comments3Likes
-
(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). In this role, Jana supports strategic customer... Read More »0Comments18Likes
-
As a refresh, at SAP we tend to talk about 4 key ERP processes for the Intelligent Enterprise: Source-to-Pay Recruit-to-Retire Design-to-Operate Lead-to-Cash This blog looks at the last of these, Lead-to-Cash, and is in fact the last in the... Read More »1Comment6Likes
-
SAPinsider 2022, Vienna The 2022 conference in Vienna has been another great SAPinsider success. The experiences and challenges that people from companies all around the world share and discuss with each other is essential to support the... Read More »1Comment7Likes