Syndicated Blog

Pathlock
The Leader in Application Security and Controls Automation

Announcing the Latest Release of Pathlock Cloud’s Application Access Governance

Pathlock is excited to unveil a new release of our Application Access Governance (AAG) product within our risk and compliance platform, Pathlock Cloud. This release marks a pivotal advancement in our mission ...

Navigating SAP Security Notes: October 2023 Patch Tuesday

SAP published seven new and two updated Security Notes for October 2023 Patch Tuesday. Relative to previous SAP Security Patch Day releases, this month’s release contains fewer patches overall and with lower ...

Navigating the UK SOX Requirements for Enhanced Compliance and Efficiency

In today’s fast-changing business landscape, keeping pace with regulatory reforms is crucial, and the UK Corporate Governance Reform (also referred to as UK SOX) is no exception. For organizations aiming not just ...
Configuring and Assigning SAP Authorizations in SAP Fiori Apps

Configuring and Assigning SAP Authorizations in SAP Fiori Apps

| | Application Security
SAP has been implementing a strategy for how users interact with its software for several years. Complex SAP applications are divided into role-based SAP Fiori apps to improve user-friendliness and enhance the ...

SAP Security Audit Log: Recommendations for Optimal Monitoring

| | Application Security
The Security Audit Log allows SAP customers to monitor users with extensive authorizations. This is particularly useful for ensuring compliance with both internal security policies and external legal requirements. The SAP standard ...

Bridging the Risk Gap: How Cross-Application Access Certifications Bolster Security

Most organizations today operate in a hybrid, multi-application environment. This also means that sensitive information and users who access this information are spread across applications. When this is the case, a crucial ...
SAP Exploit Series:  Authorization Buffer Exploits

Authorization Buffer Exploits: Why Automation is Paramount to Safeguard Your SAP Systems

SAP applications are highly sophisticated and tailored to meet the unique needs of each customer’s business processes and data requirements. As a result, managing the security of SAP applications can be equally ...

7 Strategies for Optimizing Your Access Certification Campaigns

| | Access Governance
In today’s cybersecurity landscape, Application Access Certifications are not just beneficial, but they are absolutely essential for any organization. However, many organizations struggle with time-consuming certification processes that require significant resources. The ...

Navigating SAP Security Notes: September 2023 Patch Tuesday

SAP published thirteen new and five updated Security Notes for September 2023 Patch Tuesday. Five of these Security Notes received the HotNews maximum priority rating (CVSS scores ranging from 9.0 to 10.0) ...

The Crucial Role of Certifications in Maintaining Regulatory Compliance

In today’s digital age, where data breaches and cybersecurity threats are becoming increasingly sophisticated, maintaining regulatory compliance has become paramount for organizations across various industries. Ensuring the security and privacy of sensitive ...