English | Deutsch | Español

Virtual Forge Blog

Cyber Security | Compliance | Stability

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.


How Big of an Enterprise Security Threat is Whaling and Phishing?

March 3, 2017

Even companies like Snapchat and Seagate have fallen prey to whaling and phishing attacks that steal thousands of proprietary company data records. Is your enterprise company next?

Read more

Is a Security Vulnerability Lurking in your SAP Code? Probably.

February 28, 2017

Each SAP system has 2,151 critical vulnerabilities on average. Are your enterprise organization's SAP applications safe from a major security vulnerability?

Read more

An effective way to bring SAP Security Notes under control

February 24, 2017

Thanks to security solution SAP Enterprise Threat Detection (ETD), there is a new option for monitoring known SAP security flaws in real time. It helps IT departments to prioritize upcoming patch installations.

Read more

Is IT Compliance a Bigger Threat Than External Attacks?

February 16, 2017

With 43% of security threats coming from within enterprise organizations, IT compliance has never been more of a hot topic issue for the C-Suite. Here's why IT compliance may be an even bigger threat to organizations that external attacks.

Read more

IT Security Policy Changes You Need to Adopt in 2017

February 14, 2017

Technology is changing at a breakneck speed. Is your IT security policy keeping up? If not, take a look at these three things you absolutely need to incorporate into your policy in 2017.

Read more

3 Ways Your Employees Might be a Threat to Your Enterprise Security

February 9, 2017

Companies tend to think of enterprise security issues, like data leaks, as caused by malicious activities outside the organization. But according to The Ponemon Institute, a full 25% of data breaches come from within the organization, through employee errors.

Read more

Will Android Things Solve the Issue of IoT Security?

February 7, 2017

With more and more enterprise companies adopting Internet of Things devices, Google is helping lead the way towards creating a strong IoT security framework.

Read more

Not just for ABAP development: Agreements must be kept!

February 3, 2017

Design By Contract and Encapsulation are two central concepts in software development. They promote security and stability. Well developed applications adhere to these principles.

Read more

4 Reasons Why Data Leak Prevention Should be a Top Priority in 2017

January 24, 2017

With data volume set to exceed 44 zettabytes, the growing threat of data leaks can't be overlooked. Here are 4 reasons why data leak prevention should be a top priority for CIOs and CISOs this year.

Read more

Top 3 Enterprise Security Threats to Prioritize in 2017

January 19, 2017

2016 was a year of unprecedented data breaches - most involving major enterprise organizations. What does 2017 have in store? Here are three potentially major threats to your enterprise security.

Read more

How to Avoid a Yahoo Style Data Security Breach

January 17, 2017

Yahoo breaks its own personal record for massive security breaches after trying to cover up the largest single data breach in history. Here's what you can learn from their mistakes.

Read more

Data Leak Prevention (DLP): Dealing with the problem at the source code

January 13, 2017
The undesirable loss of sensitive data from SAP poses major financial and legal risks for companies. A joint approach by Virtual Forge and KPMG is getting to the root of the problem, that is: at the program code. Read more

How Much Could a Security Vulnerability Cost Your Company? You Might be Surprised

January 4, 2017

A security vulnerability doesn't just open companies up to a potential cyber attack, it also threatens to cost them millions of dollars in lost revenue; increased insurance premiums; and regulatory fines.

Read more

3 Major IT Compliance Issues that can Derail Your Organization

December 22, 2016

IT compliance in an increasingly globalized world can present many challenges, but these three key issues are ones that can really derail an organization if not managed correctly.

Read more

3 Things Your Enterprise Needs to Address When Reviewing Your Information Security Policy

December 20, 2016

An information security policy is a must-have for IT departments, but are these three issues undermining the effectiveness of your IT policy?

Read more