Security

Enterprise Resource Planning (ERP) significantly bolsters IT security by providing a centralized and integrated approach to safeguarding critical information. ERP systems incorporate robust security features, such as user access controls, encryption, and authentication protocols, ensuring the confidentiality and integrity of sensitive data. Through continuous monitoring and audit trails, ERP enhances visibility into system activities, aiding in the early detection of potential security threats. ERP’s role extends to compliance management, assisting organizations in adhering to regulatory requirements and industry standards. By consolidating data across various business processes, ERP strengthens security measures, minimizing vulnerabilities and offering a comprehensive defense against cyber threats. This integrated approach to IT security fortifies organizations, promoting resilience and protecting against evolving cyber risks.

Image of cybersecurity
Identity security for business applications
The article emphasizes the critical need for robust identity security in business applications to protect sensitive data, highlighting challenges like managing excessive permissions, credential management, and the risks of overprovisioned access, while advocating for integrated Identity Governance and Administration solutions to streamline access management and mitigate these risks.
Maintain continuous user security after the sunsetting of Oracle GRC
As Oracle prepares to end GRC support by May 2025, companies must evaluate their options, including continuing with limited support, shifting to manual processes, or adopting third-party solutions like Fastpath's GRC module, to maintain effective internal controls and compliance.
Forterra
SAP and Onapsis collaborate to provide security incident response
SAP customers hold essential responsibilities for threat detection and incident response in both on-premise and cloud environments, necessitating a clear understanding of roles and collaboration with SAP for effective cybersecurity incident response management.
A green metal gate locked with a brass padlock |
Cybersecurity services are jumping on the AI progress train
As companies increasingly adopt AI technologies for cybersecurity, a recent Capgemini report reveals that while GenAI enhances threat response and detection, it also introduces new risks, prompting firms like Accenture and Dell to bolster their security offerings amid rising cyber threats.
image of two security cameras | CyberCare
Lines of Defence: Choosing the Right Security Solutions
Implementing cybersecurity measures ensures organisations are protected and ready to defend themselves against cyberattacks. These solutions help organisations benefit from data protection, regulatory compliance, and increased productivity. They prevent financial losses, build customer trust, provide protection for customers and support...
Ransomware
Staying cyber-careful with a security operations center
Protect your business from ransomware attacks with advanced cyber security measures with companies like Codestone.
A darkened room with a man with big headphones sitting at 3 computer screens | Delinea
Data protection in a modern enterprise environment requires a dynamic approach
By having a clearer view and a tighter grip on exactly where privilege is provided throughout an organization, firms can significantly and efficiently improve their enterprise security and protection.
Webinar – Why Business Application Security is Central to Your Security Posture
The webinar emphasizes the critical need for robust security measures in business applications like ERP and CRM to protect against rising internal and external threats, advocating for their integration into broader security strategies.
Webinar – Why Business Application Security is Central to Your Security Posture
In today’s world of interconnected systems and users from inside and outside organizations, it is more important than ever to secure resources and have a strong security posture to mitigate external and internal threats to systems and data.
CloudCare
The road to CloudCare in the wake of the CrowdStrike outage
Codestone, an IT solutions provider, is an example of a company offering a solution, with its managed service called CloudCare.
Cybersecurity
SAP Controls Series: Get SAP Under Control
The article discusses the complexities and risks associated with SAP access controls, highlighting issues such as improper provisioning, role bleed, and the challenges of managing user access, while emphasizing the need for regular reviews and clear policies to mitigate these risks.
Is Your Company Cybersecure? Looking into the Key Threats Facing the Financial Services Industry Today
Cybersecurity is not a fresh topic by any means. But even though it’s not new, it’s still important. In fact, recent government reports have shown that 32% of UK businesses were hit by an attack in the previous 12-month period, rising to 59% for medium-sized businesses and 69% for large businesses. 
Machine vs Machine: Securing Your Organisation Against AI-Powered Cyberattacks
The digital age has brought about numerous advancements, but it has also ushered in a new era of cyberthreats. While AI has been implemented as a tool to defend against cyberthreats, this double-edged sword has also been exploited by malicious actors to create new and more sophisticated cyberattacks than ever before
black and white graphic of a person holding a phone next to images of a padlock, wifi sign and web globe | The train outta cyber trouble in the smart city
The train outta cyber trouble in the smart city
When we rely on a growing network of interconnected systems to help our urban societies function, how can we keep them cyber secure? Answers can be found in case studies from the likes of Transport for London and the Pennsylvania Turnpike, as made possible by the work and offerings of AWS and Deloitte respectively.
Image of a stethoscope | Microsoft and The White House improve cybersecurity in hospitals
Microsoft and The White House work to improve cybersecurity in hospitals
Microsoft is working alongside The White House, the American Hospital Association and the National Rural Health Association to tackle the cybersecurity issues in the healthcare industry.
image of a motherboard - cyber defences
The power of IT-OT integration in fortifying cyber defenses  
The industry needs to change the direction of cybersecurity by addressing the disconnects that exist between IT and OT teams.
Three initiatives to secure digital transformation projects
Digital transformation projects often face challenges when it comes to migrating custom code applications to S/4HANA with Rise with SAP.
A metal fence : Cybersecurity SAP and Xiting
Fortifying data on your S/4 journey with SAP tailored security frameworks
With tailored SAP frameworks, companies can navigate the ever-changing cybersecurity landscape and protect their data during S/4 migrations.
Onapsis debuts new AI to boost S/4HANA, RISE and BTP security
Onapsis unveils new enhancements to its AI-driven Security Advisor and Broader Platform to advance greater SAP visibility.
Qualys CEO Thakar: A unified view of business-related risk management & remediation
Qualys, a risk management specialist in cybersecurity, unveiled its enhanced Enterprise TruRisk Platform at the 2023 Qualys Security Conference, aiming to provide organizations with a centralized approach to measure, communicate, and eliminate cyber risk through actionable insights and comprehensive tools tailored for security leaders and stakeholders.
A hand held up to a screen with the index finger showing a digital fingerprint | Remote work and GenAI
Remote work and GenAI: spanners in the cybersecurity engine?
Remote work and GenAI are here to stay. But what does this mean for enterprise cybersecurity and how are they impacting it?