by gcstco | Dec 22, 2021 | Blog, News
S/4HANA and RISE: Top Takeaways From the 2021 UKISUG . By Sarah Rabett | December 15, 2021Snow Optimizer for SAPThought Leadership At the 2021 UKI SAP User Group, I joined a group of my Snow Software colleagues as we met face-to-face, spoke with other attendees about...
by gcstco | Dec 21, 2021 | Blog, News
Implementation Considerations for Industry 4.0 . in part one of our blog posts on planning for Industry 4.0, I looked at the importance for critical infrastructure providers of taking a phased approach to the challenge of securely connecting Operational...
by gcstco | Dec 20, 2021 | Blog, News
Marketing and Advertising Companies: Data Security Best Practices . Marketing and advertising companies need to tackle new customers needs and expectations while aligning their processes and practices to new privacy requirements and technical developments. In a...
by gcstco | Dec 19, 2021 | Blog, News
Defending Connected SAP Systems Against Emerging Threats Using Deception Technology . By Moshe Ben Simon | December 16, 2021 Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today’s organizations. One...
by gcstco | Dec 16, 2021 | Blog, News
OWOWA malicious IIS module . The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool. Kaspersky TeamDecember 14, 2021 A malicious Internet Information Services (IIS) module is turning Outlook on the web into a tool for stealing...
by gcstco | Dec 15, 2021 | Blog, News
Log4j Zero-Day . How Device42 can help Device42’s discovery capability can help you identify systems vulnerable to the Log4j RCEThe Log4j vulnerability is critical and impacts many applications and systemsDevice42’s software is not impact by the Log4j vulnerability...