Security

Enterprise Resource Planning (ERP) significantly bolsters IT security by providing a centralized and integrated approach to safeguarding critical information. ERP systems incorporate robust security features, such as user access controls, encryption, and authentication protocols, ensuring the confidentiality and integrity of sensitive data. Through continuous monitoring and audit trails, ERP enhances visibility into system activities, aiding in the early detection of potential security threats. ERP’s role extends to compliance management, assisting organizations in adhering to regulatory requirements and industry standards. By consolidating data across various business processes, ERP strengthens security measures, minimizing vulnerabilities and offering a comprehensive defense against cyber threats. This integrated approach to IT security fortifies organizations, promoting resilience and protecting against evolving cyber risks.

How the digital sovereignty agenda in the EU reshapes cybersecurity
The EU's push for digital sovereignty is transforming cybersecurity into a critical, integrated discipline, prompting businesses to adopt stringent regulations, lifecycle-embedded practices, and proactive risk management.
The New SAP Defense
As organizations transition to SAP S/4HANA and hybrid-cloud architectures, the necessity for a layered Zero Trust security approach, supported by Unified Risk Management and consolidated monitoring solutions, becomes critical to address the expanded attack surface.
Microsoft Teams App opened on a phone that is sitting on a keyboard
Microsoft Teams Security Update Activates January 12, 2026
Microsoft Teams will enable new messaging safety features on January 12, 2026, strengthening protection against weaponizable file types and malicious links and adding options for users to report incorrect security detection.
ServiceNow’s Armis Acquisition Signals Strategic Enterprise IT Push
ServiceNow's $7.75 billion acquisition of Armis aims to enhance its cybersecurity offerings by merging its configuration management database with Armis' real-time asset discovery tools, thereby tripling its security revenue and addressing the integrated vulnerability management needs of enterprises.
SAP security
How SAP Customers Responded to Rising Cybersecurity Threats in 2025
In 2025, SAP customers expressed increasing concern over cyberattacks, particularly regarding data exfiltration and integration risks, while patch management remained a significant challenge, highlighting the necessity for enhanced security strategies and investments in SAP-specific protections.
Cybersecurity
Impersonation Attacks Are Reshaping Workplace Cyber Risk
Accenture's research reveals that 24% of employees under 35 are likely to respond to suspicious work messages impersonating colleagues, highlighting a shift in cybersecurity risk from technical vulnerabilities to social engineering, driven by AI advancements that exploit everyday communication practices.
Cloud Security Has Hit a Speed Wall as AI, Multicloud Outpace Defenses
The December 2025 Palo Alto Networks State of Cloud Security Report reveals that cloud security is lagging behind the rapid growth and complexity of modern IT, with a critical emphasis on identity risks and the urgent need for integration of security operations to protect increasingly vulnerable cloud systems.
SAP Sovereign Cloud
Five Risks SAP Leaders Can No Longer Ignore in 2026
As SAP vulnerabilities surge and attackers exploit weaknesses swiftly, organizations must prioritize automated security measures and cloud responsibility models while addressing legacy systems and integrating SAP into broader security operations to mitigate risks and safeguard critical business processes.
Anthropic Set to Donate MCP to New Linux Foundation Agentic AI Foundation
The Model Context Protocol (MCP) donation to the Agentic AI Foundation, under the Linux Foundation, aims to ensure its neutral governance and collaborative development within a multi-vendor environment.
Microsoft’s Canada Investment Puts Digital Sovereignty to Work
On December 9, 2025, Microsoft announced a C$7.5 billion investment to enhance AI and cloud infrastructure in Canada, building on a broader C$19 billion program, aiming to support digital sovereignty and local AI development while contributing to sustainability.
Lift-and-Shift ERP Strategies NTT DATA and Microsoft
Enterprises Turn to Cloud Security, Management Solutions for Agility, Protection, Cost Control
US enterprises are increasingly adopting managed cloud security services and cloud management solutions to enhance resilience, control costs, and address the complexities of hybrid and multi-cloud environments amid rising cybersecurity threats and operational challenges.
NATO Taps Google Cloud for AI-Ready Sovereign Infrastructure
NATO has partnered with Google Cloud to enhance its digital modernization through a multimillion-dollar commitment to an air-gapped sovereign cloud environment, improving data governance and enabling AI-driven workloads while maintaining strict security and operational control.
SAP Sovereign Cloud
SAP Is Building a Sovereign AI Stack for Europe
Regulatory trends in the EU are fostering a shift towards sovereign cloud and AI infrastructure, highlighted by companies like SAP, which has invested in local partnerships with firms like Mistral AI to enhance digital autonomy and develop industry-specific applications.
Strong AI Governance is Critical to Responsible Enterprise Deployment
As companies rapidly adopt generative and autonomous AI technologies, effective governance has become essential to mitigate risks such as accuracy, bias, and compliance, necessitating executive oversight and coordinated efforts across various departments to ensure trust and accountability in AI deployments.
Image of cybersecurity
Three Critical Priority SAP Security Patches for November
On November 11, SAP released 20 security patches, including three critical ones related to vulnerabilities in SQL Anywhere Monitor, SAP NetWeaver AS Java, and SAP Solution Manager, urging customers to apply them promptly.
Public Administrations and Secure SAP Operations
Germany's public administration struggles with digitalization, lagging behind EU standards, prompting the need for BSI-certified cloud solutions like the SAP platform from T-Systems to enhance cybersecurity and meet increasing demands for digital services.
Protect Your Valuable Data
With ransomware attacks occurring every 11 seconds and projected to rise to every 2 seconds by 2031, ensuring robust cybersecurity for vital ERP systems is crucial for businesses, demanding constant attention to people, processes, and technology.
Your ERP Is Under Attack: Are You Ready?
How enterprise leaders are protecting business applications against soaring cyber threats and why you can't afford to wait.
Ransomware attacks have doubled in the past year: Inetum LiveSOC warns for increasing cyberthreats
Cybersecurity threats are on the rise, with notable increases in ransomware attacks in Belgium, heightened by geopolitical tensions and advanced methods employed by cybercriminals, urging organizations and individuals to enhance their security measures.
City of Bruges chooses Inetum for systems management and cybersecurity in new €92 million consultancy framework agreement
Inetum has strengthened its partnership with the City of Bruges by winning two additional lots in a consultancy framework agreement focused on systems management and cybersecurity, potentially worth €92 million over six years.
image of cyber-security Microsoft D365 License
Why Microsoft’s D365 License Enforcement Is Exposing a Deeper ERP Crisis
Microsoft Dynamics 365 users in Finance, Supply Chain, and Commerce must urgently address access governance before stricter licensing rules take effect on November 1, 2025, as many organizations have uncovered significant security vulnerabilities and excessive user permissions amidst new compliance pressures.
Cybersecurity in ERP: Protecting Business Data in the Age of Rising Threats
Manufacturers are increasingly focusing on enhancing cybersecurity for their ERP systems to protect sensitive data and mitigate risks associated with cyber-attacks, which can lead to substantial financial losses and reputational damage.
securing
Securing the Digital Core
Securing ERP systems has become a business imperative due to their critical role in enterprises and increased vulnerability to cyberattacks, necessitating a shift from traditional security measures to a more integrated approach that combines IRP and cybersecurity across evolving cloud environments.
Critical SAP Zero-Day Vulnerability Under Active Exploitation
Active exploitation of a critical zero-day vulnerability (CVE-2025-31324) in the SAP Visual Composer component allows unauthenticated attackers to gain full control over SAP systems, prompting SAP to release an emergency patch and urging customers to either apply it or disable access to the vulnerable component.
security
Critical Zero-Day Vulnerability Impacts SAP
SAP has issued critical Security Notes including a highly severe vulnerability in SAP NetWeaver Visual Composer that allows unauthenticated attackers to upload malicious files, prompting organizations to urgently patch or implement workarounds to protect their systems.
How Thales is Going ‘All Smartphone’ in its Factories
Thales is pioneering digital transformation in its factories by replacing traditional PCs with smartphones and tablets through the SmartMobility project, which enhances mobility and operational efficiency while maintaining cybersecurity.
Trusted AI in Finance
Strengthen Your ERP Security with Smarter SoD and User Access Management
Effective Segregation of Duties (SoD) and user access management in ERP systems are crucial for reducing fraud risks and ensuring compliance, necessitating automation, continuous access reviews, and a balanced approach to user privileges.