Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog January 19, 2022 Get “Fancy” With Unlimited SAP GRC Reporting Integration of SAP SAC and other third-party reporting capabilities Based on our experience gained during many SAP governance, risk and compliance (GRC) implementations over recent years, we know that clients are always looking for more flexibility and visualizations to meet their internal reporting requirements. While SAP GRC provides comprehensive reports, these are table-based with limited… Blog January 26, 2022 Looking Forward: SBOM to Improve Responsiveness For the Next Log4Shell What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their… Blog January 31, 2022 CISOs and Year Two of the Pandemic – How Did We Adapt and What Still Must Change? In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine… Blog February 8, 2022 Vulnerability Management: We’ve Been Doing It All Wrong Vulnerability management is a discipline that many organizations struggle with due to one simple factor: complexity. Today, organizations manage environments with technology that changes at an ever-increasing speed while relying upon legacy systems to support key business processes. In response to this complexity challenge, cybersecurity professionals continue to create new vulnerability… Blog February 9, 2022 Making a Good Thing Better: Migrate SAP BusinessObjects Platform to the Cloud SAP Business Objects, often referred to within the SAP ecosystem as BOBJ, is one of the most evolved and reliable analytics and reporting engines running today. With over 60,000 BOBJ installations, the solution can be found in companies of all sizes in every industry around the world. Founded in 1990 and acquired by SAP in 2007, Business Objects is still primarily located in on-premise servers… Blog February 16, 2022 Building Consumer Trust With Data Privacy Programs for SAP-Run Companies Take a moment to consider your favorite relationship. What makes it special? Most likely, one of the first qualities that comes to mind is that a strong level of trust has been built. Just like in interpersonal relationships, trust is also a critical component for consumers when deciding how and with which businesses they will interact. This is especially prevalent when it comes to their digital… Blog February 17, 2022 Are Your IoT Devices Leaving Your Network Exposed? For years, we've known that Internet of Things (IoT) devices can come under attack as quickly as within five minutes of being connected to the internet. These events predominantly include large-scale scanning techniques to exploit IoT devices that are vulnerable to basic attacks such as default credentials. Historically, hackers have used these attacks to create a network of devices to perform a… Blog February 23, 2022 How Optimized Staffing Plays a Role in a Successful S/4HANA Journey As more organizations look to transform their businesses leveraging SAP’s S/4HANA and other SAP applications, it is key to consider the people side of the transformation. From a resourcing perspective there are several unique challenges that business transformation projects bring to an organization. In this post, we will look at a few of these challenges in detail and provide alternatives and… Podcast series February 28, 2022 Practical Quantum ComputingAdvantage for Businesses Guest Speaker: Alex Condello, Director-Algorithms, Performance and Tools at D-Wave Systems Inc. It’s amazing how many programming languages and interfaces exist in quantum compung already. What if there was a way to learn and use all of them without installing anything? qBraid is making that possible with a site you can join for free today. Join host Konstannos Karagiannis for a chat with Kanav… Podcast series February 28, 2022 Monte Carlo Simulations and OtherQuantum Use Cases Guest Speaker: Yianni Gamvros, Head of Business Development at QC Ware It’s amazing how many programming languages and interfaces exist in quantum compung already. What if there was a way to learn and use all of them without installing anything? qBraid is making that possible with a site you can join for free today. Join host Konstannos Karagiannis for a chat with Kanav Sea from qBraid. Load More