Remove application-security a-comprehensive-approach-to-sap-security
article thumbnail

Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

Security Boulevard

Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications ltabo Wed, 12/13/2023 - 17:25 In case you missed it, in the first part of this series we talked about the importance of hardening security for the application layer as part of your proactive approach to mitigating ransomware.

article thumbnail

Password Hash Cracking, User Cloning, and User Impersonation: Three Risks Every SAP Customer Should Know

Security Boulevard

Password Hash Cracking, User Cloning, and User Impersonation: Three Risks Every SAP Customer Should Know. Some of them, like keyloggers and credential stuffing, do not exploit SAP specific vulnerabilities. Some of them, like keyloggers and credential stuffing, do not exploit SAP specific vulnerabilities. Wed, 10/19/2022 - 15:38.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. These databases house the crown jewels of many organizations, critical applications and customer data, and thus are a primary target of hackers.

Firewall 117
article thumbnail

12 Types of Vulnerability Scans & When to Run Each

eSecurity Planet

Vulnerability scanning is critically important for identifying security flaws in hardware and software, but vulnerability scanning types are as varied as the IT environments they’re designed to protect. To centrally launch vulnerability scans or establish an automatic schedule, this approach requires administrator-credentialed access.

article thumbnail

Top GRC Tools & Software for 2021

eSecurity Planet

It includes multi-disciplinary risk and compliance management solutions and tools, including: IT & security risk management. RSA Archer removes silos from the risk management process so that all efforts are streamlined and the information is accurate, consolidated, and comprehensive. Contents: Top GRC tools comparison. RSA Archer.

article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

It includes multi-disciplinary risk and compliance management solutions and tools, including: IT & security risk management. RSA Archer removes silos from the risk management process so that all efforts are streamlined and the information is accurate, consolidated, and comprehensive. Contents: Top GRC tools comparison. RSA Archer.