English | Deutsch | Español

Virtual Forge Blog

Cyber Security | Compliance | Stability

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.

Teaser-Blog-neu.png

Take the First Step towards Higher Security with SAP® Penetration Tests

September 25, 2017

If you want to check if the doors of a house are securely locked, it is best to try it yourself. The resident has an advantage over an intruder: he knows all doors and windows which can be used or misused as entry points. The same holds true for SAP systems: a penetration test is far more effective if an external attack (black box pen-testing) is combined with an analysis of possible vulnerabilities from within (white box pen-testing).

Read more

DevSecOps – Same Subject, Different Day

September 21, 2017

It sometimes seems like new trends aren't even that new. This is especially hard to notice, if the trend has even gotten a new new. This is the case with DevOps or DevSecOps if security is being included.

Read more

Tracking Risks in Custom Code

September 13, 2017

At TRUMPF, an interruption to its SAP system could have serious consequences. This is why the mechanical engineering company, located in southwestern Germany, takes a targeted approach to ensuring seamless system operations. One approach is to use the Virtual Forge CodeProfiler, which identifies risks in custom ABAP code. 

BY SEBASTIAN REIM, SAP DEVELOPMENT TEAM LEAD AT TRUMPF GMBH + CO. KG

Read more

Small solution – big impact

September 12, 2017

Just like in life, small things can have a big impact on SAP development. For example, the quality of the customer’s code naturally depends on several factors, like the correct interception of exceptions, the use of sufficient comments, and making sure that database access does not unnecessarily waste any resources. But if one takes a closer look at customers’ development guidelines, one often finds a passage dictating naming conventions. Applying these naming conventions to all objects is not an easy task though.

Read more

SAP Security in the Age of Digitalization

September 11, 2017

No matter if Industry 4.0, SAP HANA, Cloud or Blockchains: if you want to survive on the global market, you cannot afford to shut yourself off to recent IT trends. This is also shown by the relevant offers of SAP. But the progressing digitalization means higher demands on security.

Read more

3 Ways to Minimize Email Phishing Attacks in Your Organization

August 29, 2017

Old school email phishing attacks just won't go away.  Here's how to make sure your enterprise stays ready.

Read more

Healthcare Enterprise Systems Need a Major Cybersecurity Overhaul

August 23, 2017

As hospitals increasingly utilize connected medical devices, healthcare enterprise systems are struggling to keep up with the new security measures that these devices require to keep them (and their patients) safe from hackers.

Read more

A Focus on Digitalization Might Mean More Investment in Cybersecurity

August 3, 2017

As CEOs sit up and take notice of IT infrastructure by shifting investment dollars towards digitalization, CIOs see an opportunity for a larger cybersecurity investment.

Read more

Cybersecurity Named 1 of 4 Core IT Skills Necessary for the Next Gen of Enterprise IT

July 26, 2017

The role of the IT professional has changed more in the last 5 years than most jobs. Cybersecurity is now one of four core IT skills that CIOs say will be necessary for the next generation of IT professionals.

Read more

How to Improve Cyber Security Awareness in Your Workplace

July 11, 2017

Here's how to make sure your employees have cyber security awareness and know to protect themselves and their company from vulnerabilities.

Read more

Enterprise Cloud Services Try to Woo SAP App Clients

July 4, 2017

Enterprise cloud providers are making a major push to get SAP applications on board, but are enterprise companies ready?

Read more

The Reason for Executives' Underinvestment in Cybersecurity is Rooted in Science

June 20, 2017

Ever wondered why there's such a communication gap between the C-Suite and the IT department? Behavioral science has an explanation.

Read more

How to Protect Your Executive Team from Enterprise Phishing Scams

June 15, 2017

Phishing scams, a type of cyber attack that targets users through fraudulent emails, began in 1996. Over 20 years later, it's still a hugely popular (and successful) tactic to steal company data. Here's how to make sure your executive team knows what to expect and how to react.

Read more

WannaCry is the Latest in a String of High-Profile Ransomware Attacks

May 23, 2017

A new ransomware attack is taking over where CryptoLocker left off, and it looks like it may be the most destructive ransomware attack yet.

Read more

What the C-Suite Should Know About Cross Site Scripting

May 19, 2017

Cross site scripting isn't just about defacing web properties and creating a nuisance, it's a serious threat to data security. This is why companies should pay more attention to it.

Read more