Blogs

Data protection vs SAP Direct Table Access! Are you exposed?
||
In October 2018, Morrisons was forced to pay compensation to an employee when the employee’s personal data was published illegally. In April 2019, Facebook mentioned that two datasets from Facebook apps had been exposed to the public internet and 533...
continue reading
Why SAP Security Optimization is so important?
||
Security Optimization as a Service Portfolio is the right solution to prevent a full downtime and costly security incidents by analyzing high-risk violations and taking security measures proactively. Read through this Portfolio article from SAP that details what it can...
continue reading
Hackers are Tracking Your Every Move-Secure Your SAP Systems
||
2019 was the year of data breaches, security invasions, and cyber-attacks. The healthcare industry saw the worst cyber-attacks and most of them related to identity theft. Information such as date of birth, social security number, and name allows hackers to...
continue reading
A Right Approach for Building SAP HANA Privilege Based Roles
||
SAP HANA Privilege-based Roles - A deep dive Designing, configuring, and implementing SAP Security is a complex and resource-intensive task. Hence, companies should identify the right approach before building authorizations. This is also important when it comes to SAP HANA...
continue reading
Is GDPR another SoX? The Pros and Cons of GDPR
||
While GDPR (General Data Protection Regulation) only applies in EU, its effects will be seen all over the world. There are hundreds and thousands of organizations operating in EU or handling citizen data. Without GDPR compliance, there will be no...
continue reading
What Is GDPR? Are You Ready For The Challenges?
||
When I hear about GDPR on the news and the tension it has created, the only thing that comes to the mind is, this has happened before. This is not the first time any regulation has created a stress-filled environment....
continue reading