IBM X-Force Red will use Onapsis ERP technology to help organizations uncover critical vulnerabilities
Onapsis, the global leaders in ERP cybersecurity and compliance, announced IBM Security’s team of veteran hackers, X-Force Red, will use its ERP technology to help …
Onapsis signs agreement to acquire ERP cybersecurity company Virtual Forge
Onapsis has entered into a definitive agreement to acquire privately-held Virtual Forge, headquartered in Heidelberg, Germany. Onapsis’s platform is the cybersecurity solution …
Most organizations are migrating data for ERP apps to the cloud
According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …
ERP applications under attack: How criminals target the crown jewels
Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …
New infosec products of the week: May 11, 2018
Onapsis launches new functionality to lock down SAP systems Onapsis has extended the Onapsis Security Platform (OSP) with the launch of the Enforce and Protect product module. …
SAP systems: The threat of insecure configurations
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
Most SAP systems vulnerable to critical security configuration risk
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
Onapsis raises $31 million Series C funding for ERP cybersecurity
Onapsis, the global experts in business-critical application cybersecurity and compliance, today announced a $31 million Series C minority funding round led by new investor …
Several high risk 0-day vulnerabilities affecting SAP HANA found
Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments