agileSI™ is very proud to be recognized in the Germany CyberSlide©.Read More
The US Treasury issued an Executive Order to prohibit US organizations from engaging with ERPScan, a subsidiary of Digital Security and provider of security software and services for SAP® systems. According to the press release issued by the Treasury, Digital Security “provided material and technological support to Russia’s Federal Security Service (FSB)”. ERPScan has denied any link with the FSB in an official statement.Read More
Concentrated innovation power for your IT security: agileSI™ cooperates with ISSE of the University of Augsburg.
The IT security galaxy is a space of continuous change. If you don't think about tomorrow's security, you are already exposed today to numerous external dangers without protection. Strong alliances are needed to continue to secure one's existence.Read More
The agileSI™forces are continuously working to extend the federation for SAP® compliance and security monitoring. A newly found alliance in the galaxy of agileSI™ is now joining forces to protect the SAP® (star) system. agileSI™ has found the integration of SAP® in LogRhythm SIEM.Read More
The two years transition period is almost over and after the 25th of May companies in Europe need to comply with the new data regulation. We visited the annual DSAG Developers Days in February and made an unsettling discovery – many companies using SAP® are still not ready and might not achieve GDPR-compliancy by the time of the enforcement.Read More
Cyber Security is gaining visibility and attention all over the world, in almost every newspaper, article or news-site you can read about D-DOS attacks, vulnerabilities, exploits, ransomware, and crypto jacking. No wonder that the Security BootCamp in Rotterdam attracted more than a 1,000 professionals in the Cyber or IT or OT security domain.Read More
As mentioned in the blog post "The most important five ABAP™Programming Security Pitfalls", SQL injection is one of the most common code injection attack methods, in which malicious SQL statements are inserted to execute unauthorized SQL statements in the database, e.g., read data or modify data in the database.Read More