Expert Insights sat down with our Pathlock’s Chief Marketing Officer, Mike Puterbaugh, in an exclusive interview to discuss how organizations can leverage application security and controls automation not only to improve their resilience against cyberthreats, but also to enable business performance.
Read the full interview at: https://lnkd.in/gKPZxqZM
Hamburg, July 12, 2022: SAST SOLUTIONS, the Hamburg-based specialist for SAP security and access governance and part of the international Pathlock Group, together with IBS Schreiber, the SAP security and compliance specialist also based in Hamburg, will in future offer customers the integration of IBS Schreiber rule sets through the Easy Content Solution (ECS) software.
Pathlock’s Vice President of Product Strategy and Customer Experience, David Vincent, recently appeared on Security Guy TV to talk about how effective preventive controls and security measures at the data and transaction level play an important part in securing ERP systems. He also takes a deep dive into the important difference between data security and data privacy.
We are very pleased to be able to support the Swedish foundation TRR with our software solutions in the future! The company is planning to migrate their classic SAP ERP systems to SAP S/4HANA within a time frame of 6-12 months. Our SAST SUITE can be used for both the old and the new SAP landscapes.
Information just now officially provided as part of the November SAP Patchday describes a new critical vulnerability: The SAP Security Note 2928635 (CVE-2020-6284) is a Cross-Site Scripting vulnerability (XSS) in SAP NetWeaver Knowledge Management. Act now to close the loophole!
SAST SUITE by akquinet AG scores again: The KuppingerCole analysts rates us in Leadership Compass for „Access Control Tools for SAP environments“ as international leader in three categories:
Product, Innovation and Overall Leadership.
Read more about this in the report (chargeable): https://t1p.de/ivp51
Partner contribution – Berlin, March 23, 2020. The current widespread switch to mobile working, home office, data transmission and remote authentication places increased demands on IT security to avoid creating new opportunities for attackers to take advantage of the moment.
The mass e-mail campaigns sending malware are most often the vehicle bringing malware into systems. So-called “phishing” e-mails are particularly dangerous: Cyber criminals use these to “fish” for passwords and other personal information. These e-mails contain infected links or attachments and remain the most common method of distributing malware.