Security & compliance of business operations are critical in this age of rising cyber threats, increasing compliance regulations, and rapid technological change. SAP customers, partners and SAP employees put great effort in to meet those risks and work towards effective security outcomes and cyber resilient systems. We benefit from each others' challenges and successes to protect the business processes and services we all depend on. Join us here for blog posts and thought leadership regarding the security and compliance of SAP software and cloud services, as well as secure development, deployment, and operational practices, whether on-premise or cloud.
People say that “cloud is just someone else’s computer”. That obscures significant differences between data centers and enterprise IT on one side, and cloud services on the other. Security professiona...
Many cyber threats target core IT infrastructure, rather than specialized applications like ERP systems. However, there is a rising threat of malware specifically targeting SAP solutions – rather than...
At SAP, cybersecurity is paramount. We know that our customers trust us to provide solutions that help them keep business-critical data and systems safe. That’s why we’ve implemented the National Inst...
SAP security teams, including Governance, Risk and Compliance (GCS), have special skills and experience that greatly benefit their cybersecurity counterparts. Cybersecurity is increasingly aware they ...
RISE with SAP provides an attractive solution for organizations to deploy their S/4 HANA solutions in a private cloud environment, available on various public cloud provider platforms, including Amazo...
Security & compliance of business operations are critical in this age of rising cyber threats, increasing compliance regulations, and rapid technological change. SAP customers, partners and SAP employ...
Effective cybersecurity begins with doing the fundamentals well. One of those fundamentals is asset inventory management. In this article, we celebrate the unsung heroes that work and innovate in a cr...
Change in Progress (Update 2024-07-29)Google has revised its strategy (July 22nd, 2024) regarding the third-party cookie deprecation. Instead of enforcing tracking protection by blocking third-party c...
SAP requires that its products and supporting services meet the security requirements set by the company. Inevitably, though, with SAP’s variety, complexity, and rate of change in the organization a...
RISE provides the opportunity for SAP Basis administrators to focus on higher value activities. Cybersecurity (or information security, depending on one’s career trajectory) grew out of infrastructure...
The resilient survive, not necessarily the strongest. The resilient know how to withstand and recover from adverse situations, or even thrive during rapid change. When business, technology, cyber and ...
On March 7th, the US National Security Agency (NSA) published 10 strategies for securing cloud landscapes. These 10 strategies are an important contribution to cloud security, especially since the rec...
In this age of swift technological progression and changing regulatory landscape, businesses are progressively capitalizing on data, artificial intelligence (AI), machine learning (ML), and cloud tec...
Discover how SAP secures over 6,000 AWS accounts with automated scanning and alerting.Learn how our "Secure by Default" approach, leveraging cloud security tools, enhances security posture, scalabilit...