English | Deutsch | Español

Virtual Forge Blog

Cyber Security | Compliance | Stability

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.


New York State Introduces New Cyber Security Regulations for Financial Firms

March 23, 2017

New York is introducing new cybersecurity legislation for financial companies. If your financial firm does business in New York State, get ready - these regulations are hard-hitting and thorough. Here's what you need to know.

Read more

The Modern Workforce Still Runs on Old School Workplace Technology

March 17, 2017

New workplace technology, like productivity and collaboration tools, isn't as popular with workers as you may think. And it's causing some serious issues for IT security.

Read more

Source of Danger: SAP Basis Administration

March 14, 2017

Data protection in SAP systems is among the most urgent security tasks in the financial sector. However, tests at various financial institutions have uncovered serious vulnerabilities in SAP Basis administration.   

Read more

Ransomware was Still One of the Top Security Threats in 2016

March 10, 2017

From increased instances of ransomware to a bump in phishing attacks targeted to financial services customers, we're seeing more spam than we've ever seen before.

Read more

How Big of an Enterprise Security Threat is Whaling and Phishing?

March 3, 2017

Even companies like Snapchat and Seagate have fallen prey to whaling and phishing attacks that steal thousands of proprietary company data records. Is your enterprise company next?

Read more

Is a Security Vulnerability Lurking in your SAP Code? Probably.

February 28, 2017

Each SAP system has 2,151 critical vulnerabilities on average. Are your enterprise organization's SAP applications safe from a major security vulnerability?

Read more

An effective way to bring SAP Security Notes under control

February 24, 2017

Thanks to security solution SAP Enterprise Threat Detection (ETD), there is a new option for monitoring known SAP security flaws in real time. It helps IT departments to prioritize upcoming patch installations.

Read more

Is IT Compliance a Bigger Threat Than External Attacks?

February 16, 2017

With 43% of security threats coming from within enterprise organizations, IT compliance has never been more of a hot topic issue for the C-Suite. Here's why IT compliance may be an even bigger threat to organizations that external attacks.

Read more

IT Security Policy Changes You Need to Adopt in 2017

February 14, 2017

Technology is changing at a breakneck speed. Is your IT security policy keeping up? If not, take a look at these three things you absolutely need to incorporate into your policy in 2017.

Read more

3 Ways Your Employees Might be a Threat to Your Enterprise Security

February 9, 2017

Companies tend to think of enterprise security issues, like data leaks, as caused by malicious activities outside the organization. But according to The Ponemon Institute, a full 25% of data breaches come from within the organization, through employee errors.

Read more

Will Android Things Solve the Issue of IoT Security?

February 7, 2017

With more and more enterprise companies adopting Internet of Things devices, Google is helping lead the way towards creating a strong IoT security framework.

Read more

Not just for ABAP development: Agreements must be kept!

February 3, 2017

Design By Contract and Encapsulation are two central concepts in software development. They promote security and stability. Well developed applications adhere to these principles.

Read more

4 Reasons Why Data Leak Prevention Should be a Top Priority in 2017

January 24, 2017

With data volume set to exceed 44 zettabytes, the growing threat of data leaks can't be overlooked. Here are 4 reasons why data leak prevention should be a top priority for CIOs and CISOs this year.

Read more

Top 3 Enterprise Security Threats to Prioritize in 2017

January 19, 2017

2016 was a year of unprecedented data breaches - most involving major enterprise organizations. What does 2017 have in store? Here are three potentially major threats to your enterprise security.

Read more

How to Avoid a Yahoo Style Data Security Breach

January 17, 2017

Yahoo breaks its own personal record for massive security breaches after trying to cover up the largest single data breach in history. Here's what you can learn from their mistakes.

Read more