Blogs

Blogs

ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities

2022-10-06T10:44:44+02:00Oktober 6th, 2022|

by Bhabesh Raj Rai, Security ResearchOn September 29, 2022, Microsoft confirmed reports of adversaries exploiting two zero-day vulnerabilities that affect [...]

Read More

Logon And Password Security in SAP Systems – How to keep them safe using Logpoint SIEM and BCS for SAP

2022-09-30T10:18:30+02:00September 30th, 2022|

by Sükrü ilkel Birakoglu, Senior Director Business Critical Systems house a wealth of business-critical data relating to supply chains and product [...]

Read More

Protect your business and configuration data: ABAP/4 code security in SAP systems – safety starts at development

2022-09-29T16:39:17+02:00September 29th, 2022|

by Sükrü ilkel Birakoglu, Senior Director In all common programming languages, faults during development may lead to immense security vulnerabilities in [...]

Read More

Logpoints marktführendes SIEM ist die beste Lösung für Managed Security Service Provider

2022-10-06T09:36:52+02:00September 26th, 2022|

Da das Datenvolumen exponentiell ansteigt, suchen Unternehmen immer häufiger die Hilfe von Managed Security Service Providern (MSSPs). Das ergibt Sinn. [...]

Read More

SAP HANA: Was sind die größten Vorteile der oft unterschätzten Logdaten-Quelle?

2022-09-28T11:44:14+02:00September 21st, 2022|

von Dmitry Gutsko, SAP Security ExpertEs gibt viele Silos und blinde Flecken in SAP-Systemen – beispielsweise werden SAP-Datenbanksysteme oft übersehen, [...]

Read More
Go to Top