Our Blog
Home / Blog

Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability
Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability . The remaining days before Christmas will not be relaxing ones for IT and IT security managers in companies around the world: The Log4Shell...

S/4HANA and RISE: Top Takeaways From the 2021 UKISUG
S/4HANA and RISE: Top Takeaways From the 2021 UKISUG . By Sarah Rabett | December 15, 2021Snow Optimizer for SAPThought Leadership At the 2021 UKI SAP User Group, I joined a group of my Snow Software colleagues as we met face-to-face, spoke with other attendees about...

Implementation Considerations for Industry 4.0
Implementation Considerations for Industry 4.0 . in part one of our blog posts on planning for Industry 4.0, I looked at the importance for critical infrastructure providers of taking a phased approach to the challenge of securely connecting Operational...

Marketing and Advertising Companies: Data Security Best Practices
Marketing and Advertising Companies: Data Security Best Practices . Marketing and advertising companies need to tackle new customers needs and expectations while aligning their processes and practices to new privacy requirements and technical developments. In a...

Defending Connected SAP Systems Against Emerging Threats Using Deception Technology
Defending Connected SAP Systems Against Emerging Threats Using Deception Technology . By Moshe Ben Simon | December 16, 2021 Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today's organizations. One...