Security

Enterprise Resource Planning (ERP) significantly bolsters IT security by providing a centralized and integrated approach to safeguarding critical information. ERP systems incorporate robust security features, such as user access controls, encryption, and authentication protocols, ensuring the confidentiality and integrity of sensitive data. Through continuous monitoring and audit trails, ERP enhances visibility into system activities, aiding in the early detection of potential security threats. ERP’s role extends to compliance management, assisting organizations in adhering to regulatory requirements and industry standards. By consolidating data across various business processes, ERP strengthens security measures, minimizing vulnerabilities and offering a comprehensive defense against cyber threats. This integrated approach to IT security fortifies organizations, promoting resilience and protecting against evolving cyber risks.

US Air Force Awards Oracle $88M to Expand Cloud One Modernization with OCI, AI Database
The US Department of the Air Force has awarded Oracle an $88 million task order to provide Oracle Cloud Infrastructure services, enhancing cloud modernization efforts and expanding access to AI-enabled database capabilities in classified environments.
Pathlock logo representing SAP threat detection integration with Microsoft Sentinel SIEM architecture.
Pathlock Extends SAP Threat Detection into Microsoft Sentinel’s SIEM Architecture
Pathlock has extended its SAP Threat Detection capability into Microsoft Sentinel’s SIEM architecture, bringing enriched SAP security telemetry into centralized SOC workflows across hybrid SAP environments.
Nvidia logo displayed against stock market chart background symbolizing AI infrastructure growth and earnings performance.
Nvidia Earnings Signal Expanding AI Infrastructure—and New ERP Risk Dependencies
Nvidia’s FY26 earnings confirm accelerating AI infrastructure investment. For ERP leaders, the real story lies in emerging dependencies across hyperscaler leverage, security posture, and enterprise data governance.
European Union flag in front of modern glass office buildings symbolizing cloud sovereignty and digital regulation in Europe.
Why Inetum Sees Control—Not Infrastructure—as the Real Sovereignty Challenge
ERP modernization in Europe now unfolds under sovereignty expectations. Data control, hybrid architecture, and governance-by-design increasingly determine whether AI-enabled systems can withstand regulatory scrutiny and scale with confidence.
New Relic’s Innovations Simplify OpenTelemetry Enterprise Adoption
New Relic is transforming OpenTelemetry from a challenging migration into a gradual operational shift, enabling organizations to standardize on OTel without replacing existing systems, thereby alleviating vendor lock-in, enhancing observability management and controlling operational costs.
Cybersecurity
Bell Cyber and Radware Expand AI-driven, Cloud-Delivered Security Services
Bell Cyber and Radware are launching a unified, AI-driven managed security service to enhance protection against sophisticated cyberattacks for enterprises.
Munich Security Conference 2026 venue interior with MSC screens and white dove installation, photographed by Jens Hartmann for MSC.
Cybersecurity at the Munich Security Conference—What It Means for Businesses
Cybersecurity was central to discussions at the Munich Security Conference 2026. As state leaders integrate cyber into national security planning, enterprise risk, cloud strategy, and infrastructure resilience are being reshaped by geopolitical realities.
SAP logo displayed at company office, representing enterprise software security and monthly Patch Day updates.
SAP February Patch Day Puts ABAP and Platform Risk in Focus
SAP’s February 2026 Patch Day delivered 26 new notes and one update, with critical exposure centered in ABAP and core platform services. Vendors warn impact depends on how trust and integrations operate inside each landscape.
Microsoft Maia 200 Inference Accelerator Targets AI Economics at Enterprise Scale
Microsoft's Maia 200 inference accelerator, built on TSMC's 3-nanometer process, boasts 30% improved performance per dollar over prior hardware, featuring advanced specifications aimed at optimizing AI model efficiency.
Microsoft logo displayed on a dark sign mounted on a concrete wall
Microsoft Data Security Index 2026: AI Adoption Is Outpacing Data Security Controls
Microsoft’s 2026 Data Security Index shows generative AI adoption accelerating faster than data security controls, exposing governance and visibility gaps across enterprise environments.
Microsoft Defender for Office 365 log displayed on a phone in front of a keyboard.
Microsoft Warns of Rising PhaaS Attacks in 365 Environments
Microsoft warns of rising internal-looking phishing in Microsoft 365, which exploit misconfigured routing and weak authentication. PhaaS platforms like Tycoon2FA automate these attacks, and hybrid email environments from cloud migrations increase risk, making enterprise inboxes more vulnerable.
The Enterprise AI Revolution Is Boring, and That Is What Makes It Work
The article advocates for 'boring AI,' which emphasizes embedding AI into back-end processes and workflows to deliver real operational value, as opposed to flashy, superficial applications that often fail to provide measurable returns.
SAP
RISE with SAP: Cloud ERP Adoption Accelerates Ahead of 2027 Deadline—SAPinsider Benchmark Report
SAPinsider’s RISE with SAP 2025 benchmark shows cloud ERP adoption accelerating as the 2027 end-of-maintenance deadline approaches. New data reveals how generative AI, security readiness, and organizational size are shaping SAP S/4HANA Cloud Private migration decisions.
Red Hat signage on a office building.
Red Hat Acquires Chatterbox Labs to Strengthen AI Safety and Governance
Red Hat acquires Chatterbox Labs to add AI safety, guardrails, and risk metrics across its enterprise AI portfolio.
Ellucian Completes Anthology SIS and ERP Acquisition, Adding 260 Higher Education Customers
Ellucian's acquisition of Anthology's Student Information Systems and ERP business, following Anthology's bankruptcy, expands its customer base to more than 260 institutions.
Keyboard with a key that shows a Microsoft logo with a lock over it
How Microsoft Security Copilot Helps Lean Teams Scale Incident Response and Compliance
Security teams increasingly face cyber threats beyond their investigative capacities, leading to the adoption of generative AI tools such as Microsoft Security Copilot, which enhances threat investigation, incident response, and policy management.
US Department of Defense webpage open on a smartphone
CMMC 2.0 Enters Enforcement: What Contractors and Vendors Must Know
CMMC 2.0 enforcement has begun, shifting defense contractors from voluntary cybersecurity guidance to mandatory compliance under a phased rollout with defined certification levels and assessments.
Shedding Data Baggage for a Leaner SAP Cloud
Migrating to SAP Cloud ERP Private promises streamlined processes and agility, but organizations must first conduct a thorough assessment of their data to avoid complicating the transition with unnecessary legacy information, which can drive up costs and hinder performance.
How the digital sovereignty agenda in the EU reshapes cybersecurity
The EU's push for digital sovereignty is transforming cybersecurity into a critical, integrated discipline, prompting businesses to adopt stringent regulations, lifecycle-embedded practices, and proactive risk management.
The New SAP Defense
As organizations transition to SAP S/4HANA and hybrid-cloud architectures, the necessity for a layered Zero Trust security approach, supported by Unified Risk Management and consolidated monitoring solutions, becomes critical to address the expanded attack surface.
Microsoft Teams App opened on a phone that is sitting on a keyboard
Microsoft Teams Security Update Activates January 12, 2026
Microsoft Teams will enable new messaging safety features on January 12, 2026, strengthening protection against weaponizable file types and malicious links and adding options for users to report incorrect security detection.
ServiceNow’s Armis Acquisition Signals Strategic Enterprise IT Push
ServiceNow's $7.75 billion acquisition of Armis aims to enhance its cybersecurity offerings by merging its configuration management database with Armis' real-time asset discovery tools, thereby tripling its security revenue and addressing the integrated vulnerability management needs of enterprises.
Palo Alto, Google Cloud Expand AI Security Alliance as 99% of Organizations Report AI Attacks
Palo Alto Networks and Google Cloud have expanded their partnership with a nearly $10 billion deal to enhance AI and cloud security, integrating Palo Alto’s Prisma AIRS platform with Google Cloud’s infrastructure to provide comprehensive security across hybrid multicloud environments.
SAP security
How SAP Customers Responded to Rising Cybersecurity Threats in 2025
In 2025, SAP customers expressed increasing concern over cyberattacks, particularly regarding data exfiltration and integration risks, while patch management remained a significant challenge, highlighting the necessity for enhanced security strategies and investments in SAP-specific protections.
Cybersecurity
Impersonation Attacks Are Reshaping Workplace Cyber Risk
Accenture's research reveals that 24% of employees under 35 are likely to respond to suspicious work messages impersonating colleagues, highlighting a shift in cybersecurity risk from technical vulnerabilities to social engineering, driven by AI advancements that exploit everyday communication practices.
Cloud Security Has Hit a Speed Wall as AI, Multicloud Outpace Defenses
The December 2025 Palo Alto Networks State of Cloud Security Report reveals that cloud security is lagging behind the rapid growth and complexity of modern IT, with a critical emphasis on identity risks and the urgent need for integration of security operations to protect increasingly vulnerable cloud systems.
SAP Sovereign Cloud
Five Risks SAP Leaders Can No Longer Ignore in 2026
As SAP vulnerabilities surge and attackers exploit weaknesses swiftly, organizations must prioritize automated security measures and cloud responsibility models while addressing legacy systems and integrating SAP into broader security operations to mitigate risks and safeguard critical business processes.