English | Deutsch | Español

Virtual Forge Blog

Cyber Security | Compliance | Stability

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.

Teaser-Blog-neu.png

New Cyber Attack Targets MSPs and Their Customers

April 20, 2017

A sophisticated cyber attack targeting MSPs and cloud services companies, along with their customers, has security professionals worried about massive data breaches leaving potentially thousands of companies vulnerable.

Read more

Here's Why the IT Skills Gap is Still a Problem

April 12, 2017

If the hiring industry is looking bleak, then the IT skills gap is making hiring in the IT industry look like a lost cause. Here's why it's such a big problem.

Read more

Google Takes on Cloud Computing for the Enterprise

April 6, 2017

With the enterprise cloud's strong annual growth, major tech players are turning their attention to the cloud computing market that's worth hundreds of billions of dollars.

Read more

Topics: Cloud Computing

New York State Introduces New Cyber Security Regulations for Financial Firms

March 23, 2017

New York is introducing new cybersecurity legislation for financial companies. If your financial firm does business in New York State, get ready - these regulations are hard-hitting and thorough. Here's what you need to know.

Read more

The Modern Workforce Still Runs on Old School Workplace Technology

March 17, 2017

New workplace technology, like productivity and collaboration tools, isn't as popular with workers as you may think. And it's causing some serious issues for IT security.

Read more

Source of Danger: SAP Basis Administration

March 14, 2017

Data protection in SAP systems is among the most urgent security tasks in the financial sector. However, tests at various financial institutions have uncovered serious vulnerabilities in SAP Basis administration.   

Read more

Ransomware was Still One of the Top Security Threats in 2016

March 10, 2017

From increased instances of ransomware to a bump in phishing attacks targeted to financial services customers, we're seeing more spam than we've ever seen before.

Read more

How Big of an Enterprise Security Threat is Whaling and Phishing?

March 3, 2017

Even companies like Snapchat and Seagate have fallen prey to whaling and phishing attacks that steal thousands of proprietary company data records. Is your enterprise company next?

Read more

Is a Security Vulnerability Lurking in your SAP Code? Probably.

February 28, 2017

Each SAP system has 2,151 critical vulnerabilities on average. Are your enterprise organization's SAP applications safe from a major security vulnerability?

Read more

An effective way to bring SAP Security Notes under control

February 24, 2017

Thanks to security solution SAP Enterprise Threat Detection (ETD), there is a new option for monitoring known SAP security flaws in real time. It helps IT departments to prioritize upcoming patch installations.

Read more

Is IT Compliance a Bigger Threat Than External Attacks?

February 16, 2017

With 43% of security threats coming from within enterprise organizations, IT compliance has never been more of a hot topic issue for the C-Suite. Here's why IT compliance may be an even bigger threat to organizations that external attacks.

Read more

IT Security Policy Changes You Need to Adopt in 2017

February 14, 2017

Technology is changing at a breakneck speed. Is your IT security policy keeping up? If not, take a look at these three things you absolutely need to incorporate into your policy in 2017.

Read more

3 Ways Your Employees Might be a Threat to Your Enterprise Security

February 9, 2017

Companies tend to think of enterprise security issues, like data leaks, as caused by malicious activities outside the organization. But according to The Ponemon Institute, a full 25% of data breaches come from within the organization, through employee errors.

Read more

Will Android Things Solve the Issue of IoT Security?

February 7, 2017

With more and more enterprise companies adopting Internet of Things devices, Google is helping lead the way towards creating a strong IoT security framework.

Read more

Not just for ABAP development: Agreements must be kept!

February 3, 2017

Design By Contract and Encapsulation are two central concepts in software development. They promote security and stability. Well developed applications adhere to these principles.

Read more