By Christoph Nagy, CEO of SecurityBridge
To detect attacks on SAP, you need to evaluate the security logs in SAP.
While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we…
Source: www.cyberdefensemagazine.com – Read more
SIEM for SAP – Log Evaluation to Attack Detection


Must Read
Why did SentinelOne shares plummet by 35% in a single day?
The highest-valued cybersecurity IPO in history was that of Israel-founded company SentinelOne, which has been managed since its inception by Tomer Weingarten. The offering,...