Security

Enterprise Resource Planning (ERP) significantly bolsters IT security by providing a centralized and integrated approach to safeguarding critical information. ERP systems incorporate robust security features, such as user access controls, encryption, and authentication protocols, ensuring the confidentiality and integrity of sensitive data. Through continuous monitoring and audit trails, ERP enhances visibility into system activities, aiding in the early detection of potential security threats. ERP’s role extends to compliance management, assisting organizations in adhering to regulatory requirements and industry standards. By consolidating data across various business processes, ERP strengthens security measures, minimizing vulnerabilities and offering a comprehensive defense against cyber threats. This integrated approach to IT security fortifies organizations, promoting resilience and protecting against evolving cyber risks.

Anthropic Set to Donate MCP to New Linux Foundation Agentic AI Foundation
The Model Context Protocol (MCP) donation to the Agentic AI Foundation, under the Linux Foundation, aims to ensure its neutral governance and collaborative development within a multi-vendor environment.
Microsoft’s Canada Investment Puts Digital Sovereignty to Work
On December 9, 2025, Microsoft announced a C$7.5 billion investment to enhance AI and cloud infrastructure in Canada, building on a broader C$19 billion program, aiming to support digital sovereignty and local AI development while contributing to sustainability.
A lock is shown on top of a laptop keyboard | Onapsis
SAP Issues Three Critical Security Fixes in December Patch Day
On December 9, SAP released 14 security notes, including three critical patches for vulnerabilities in SAP Solution Manager, Apache Tomcat in SAP Commerce Cloud, and SAP jConnect, urging customers to prioritize updates based on severity to protect against potential exploits.
Lift-and-Shift ERP Strategies NTT DATA and Microsoft
Enterprises Turn to Cloud Security, Management Solutions for Agility, Protection, Cost Control
US enterprises are increasingly adopting managed cloud security services and cloud management solutions to enhance resilience, control costs, and address the complexities of hybrid and multi-cloud environments amid rising cybersecurity threats and operational challenges.
SAP Sovereign Cloud
SAP Is Building a Sovereign AI Stack for Europe
Regulatory trends in the EU are fostering a shift towards sovereign cloud and AI infrastructure, highlighted by companies like SAP, which has invested in local partnerships with firms like Mistral AI to enhance digital autonomy and develop industry-specific applications.
Lift-and-Shift ERP Strategies NTT DATA and Microsoft
IBM OpenPages as a Service Expands European Availability
IBM's OpenPages as a Service launch in the Cloud Germany data center enhances EU-centric governance, risk and compliance capabilities by ensuring data residency, improved performance and modernized software-as-a-service (SaaS) options.
Strong AI Governance is Critical to Responsible Enterprise Deployment
As companies rapidly adopt generative and autonomous AI technologies, effective governance has become essential to mitigate risks such as accuracy, bias, and compliance, necessitating executive oversight and coordinated efforts across various departments to ensure trust and accountability in AI deployments.
Image of cybersecurity
Three Critical Priority SAP Security Patches for November
On November 11, SAP released 20 security patches, including three critical ones related to vulnerabilities in SQL Anywhere Monitor, SAP NetWeaver AS Java, and SAP Solution Manager, urging customers to apply them promptly.
Public Administrations and Secure SAP Operations
Germany's public administration struggles with digitalization, lagging behind EU standards, prompting the need for BSI-certified cloud solutions like the SAP platform from T-Systems to enhance cybersecurity and meet increasing demands for digital services.
Protect Your Valuable Data
With ransomware attacks occurring every 11 seconds and projected to rise to every 2 seconds by 2031, ensuring robust cybersecurity for vital ERP systems is crucial for businesses, demanding constant attention to people, processes, and technology.
Ransomware attacks have doubled in the past year: Inetum LiveSOC warns for increasing cyberthreats
Cybersecurity threats are on the rise, with notable increases in ransomware attacks in Belgium, heightened by geopolitical tensions and advanced methods employed by cybercriminals, urging organizations and individuals to enhance their security measures.
City of Bruges chooses Inetum for systems management and cybersecurity in new €92 million consultancy framework agreement
Inetum has strengthened its partnership with the City of Bruges by winning two additional lots in a consultancy framework agreement focused on systems management and cybersecurity, potentially worth €92 million over six years.
image of cyber-security Microsoft D365 License
Why Microsoft’s D365 License Enforcement Is Exposing a Deeper ERP Crisis
Microsoft Dynamics 365 users in Finance, Supply Chain, and Commerce must urgently address access governance before stricter licensing rules take effect on November 1, 2025, as many organizations have uncovered significant security vulnerabilities and excessive user permissions amidst new compliance pressures.
securing
Securing the Digital Core
Securing ERP systems has become a business imperative due to their critical role in enterprises and increased vulnerability to cyberattacks, necessitating a shift from traditional security measures to a more integrated approach that combines IRP and cybersecurity across evolving cloud environments.
Critical SAP Zero-Day Vulnerability Under Active Exploitation
Active exploitation of a critical zero-day vulnerability (CVE-2025-31324) in the SAP Visual Composer component allows unauthenticated attackers to gain full control over SAP systems, prompting SAP to release an emergency patch and urging customers to either apply it or disable access to the vulnerable component.
security
Critical Zero-Day Vulnerability Impacts SAP
SAP has issued critical Security Notes including a highly severe vulnerability in SAP NetWeaver Visual Composer that allows unauthenticated attackers to upload malicious files, prompting organizations to urgently patch or implement workarounds to protect their systems.
How Thales is Going ‘All Smartphone’ in its Factories
Thales is pioneering digital transformation in its factories by replacing traditional PCs with smartphones and tablets through the SmartMobility project, which enhances mobility and operational efficiency while maintaining cybersecurity.
Trusted AI in Finance
Strengthen Your ERP Security with Smarter SoD and User Access Management
Effective Segregation of Duties (SoD) and user access management in ERP systems are crucial for reducing fraud risks and ensuring compliance, necessitating automation, continuous access reviews, and a balanced approach to user privileges.
Cybersecurity
Why Identity Security is a Top Priority for Enterprises in 2025
In response to rising identity-related threats, 78% of organizations are set to increase their identity and access management spending in 2025, reflecting a strategic shift towards modern security measures that emphasize complex governance and AI-driven solutions to enhance resilience in the digital landscape.
Google to Acquire Wiz for $32 Billion in Cloud Security Push
Google Cloud to Acquire Wiz for $32 Billion in Cloud Security Push
Google Cloud has acquired cybersecurity platform Wiz for $32 billion, aiming to enhance security technology and scalability across multi-cloud environments.
Dell and Microsoft cybersecurity
Dell Strengthens Cybersecurity for Microsoft Customers
Dell Technologies and Microsoft are enhancing AI adoption to protect data and improve cybersecurity for multicloud environments.
A Step Ahead: Onapsis CEO Mariano Nunez
Onapsis CEO Mariano Nunez talks about the importance of cybersecurity in today's ERP landscape, shared security responsibility, and why it is vital to embed security from the start.
Enterprise Success Story: How Signify Transformed Financial Close Processes with Aico
Signify enhanced efficiency and quality control across over 100 company codes by utilizing Aico’s modules, achieving a 99.9% success rate in journal management, real-time reporting with 15-second dashboard refresh rates, a 30% reduction in obsolete tasks, an increase of 250-350 additional reconciliations per company code, and a jump to 58% automation in BSAR sign-offs.
Deloitte & Onapsis Strategic Alliance
Deloitte and Onapsis Form Strategic Alliance to Help Shared Clients Secure SAP S/4HANA Cloud®, RISE with SAP® and Cloud ERP Digital Transformations.
ERP Security for Utility Companies – Onapsis Partners with SNOPUD to Secure Critical SAP Applications
Cyberattacks on utility companies are increasingly targeting vulnerabilities in SAP applications, posing significant financial and operational risks, with the average cost of a data breach reaching $4.72 million. The energy sector, with its sensitive enterprise resource planning (ERP) systems like SAP, is particularly attractive to cybercriminals. Despite this, many utility companies struggle to allocate adequate resources for security, especially amid ongoing digital transformation efforts. The consequences of such attacks can be severe, leading to business disruptions, power or water outages, and the theft of customer data. To address these challenges, Onapsis, a leader in business application security, has partnered with Snohomish County Public Utility District (SNOPUD) to enhance SAP security through its Connect Up initiative, aimed at upgrading meters across homes and businesses. This collaboration leverages Onapsis' threat intelligence and automated vulnerability remediation to safeguard SNOPUD's critical systems and customer data, supporting a security-first approach as the utility modernizes its operations.
Hash Cracking and the SAP Landscape
This article discusses the use of hashing for password security in SAP systems, explaining how hashes are stored, methods for cracking them using tools like JohnTheRipper and Hashcat, and emphasizes the importance of addressing weak hashes and deactivating downward compatibility to enhance data protection.
Securing SAP Remote Function Calls: The Crucial Role of S_ICF Authorization
Remote Function Call (RFC) is a proprietary framework and network protocol used as a key pillar for data exchange in SAP landscapes. For network communications based upon the RFC framework, connection information needs to be configured and stored on the...