English | Deutsch | Español

Virtual Forge Blog

Cyber Security | Compliance | Stability

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.


The Reason for Executives' Underinvestment in Cybersecurity is Rooted in Science

June 20, 2017

Ever wondered why there's such a communication gap between the C-Suite and the IT department? Behavioral science has an explanation.

Read more

How to Protect Your Executive Team from Enterprise Phishing Scams

June 15, 2017

Phishing scams, a type of cyber attack that targets users through fraudulent emails, began in 1996. Over 20 years later, it's still a hugely popular (and successful) tactic to steal company data. Here's how to make sure your executive team knows what to expect and how to react.

Read more

WannaCry is the Latest in a String of High-Profile Ransomware Attacks

May 23, 2017

A new ransomware attack is taking over where CryptoLocker left off, and it looks like it may be the most destructive ransomware attack yet.

Read more

What the C-Suite Should Know About Cross Site Scripting

May 19, 2017

Cross site scripting isn't just about defacing web properties and creating a nuisance, it's a serious threat to data security. This is why companies should pay more attention to it.

Read more

Ding-dong ditching pyromaniacal kleptomaniacs or never trust user input

May 17, 2017

One of the oldest abbreviations in the acronym-rich terminology of information technology is called IPO and stands for Input – Process – Output. However, the problems already start for the security-savvy developer with the first letter of this abbreviation: with the input of data.

Read more

Why SAP Security Is Difficult For Security Departments To Understand

May 16, 2017

I recently wanted to tell a colleague of one of our partners the benefits of our Virtual Forge TransportProfiler solution. The first question I encountered was “What is a transport?” Now, it’s not as if the individual with whom I was speaking was incompetent: He has over 25 years of experience in IT security, CISSP, CISM, and as a lecturer; nevertheless, in the long conversation followed, I had to explain to him the basic architecture of an SAP system.

Read more

5 Promising Technologies in Enterprise IOT Security

May 5, 2017

IoT security - or a lack thereof - has been a major topic of conversation for most everyone who works in tech or IT. But finally, there's some new IoT security technologies that are showing promise. Here's what you should know.

Read more

Who is Responsible for SAP Security?

April 26, 2017

Despite the fact that IT professionals and CISOs understand the seriousness of cyber security threats, there's still a major communication gap when it comes to who needs to own SAP security.

Read more

New Cyber Attack Targets MSPs and Their Customers

April 20, 2017

A sophisticated cyber attack targeting MSPs and cloud services companies, along with their customers, has security professionals worried about massive data breaches leaving potentially thousands of companies vulnerable.

Read more

Here's Why the IT Skills Gap is Still a Problem

April 12, 2017

If the hiring industry is looking bleak, then the IT skills gap is making hiring in the IT industry look like a lost cause. Here's why it's such a big problem.

Read more

Google Takes on Cloud Computing for the Enterprise

April 6, 2017

With the enterprise cloud's strong annual growth, major tech players are turning their attention to the cloud computing market that's worth hundreds of billions of dollars.

Read more

Topics: Cloud Computing

New York State Introduces New Cyber Security Regulations for Financial Firms

March 23, 2017

New York is introducing new cybersecurity legislation for financial companies. If your financial firm does business in New York State, get ready - these regulations are hard-hitting and thorough. Here's what you need to know.

Read more

The Modern Workforce Still Runs on Old School Workplace Technology

March 17, 2017

New workplace technology, like productivity and collaboration tools, isn't as popular with workers as you may think. And it's causing some serious issues for IT security.

Read more

Source of Danger: SAP Basis Administration

March 14, 2017

Data protection in SAP systems is among the most urgent security tasks in the financial sector. However, tests at various financial institutions have uncovered serious vulnerabilities in SAP Basis administration.   

Read more

Ransomware was Still One of the Top Security Threats in 2016

March 10, 2017

From increased instances of ransomware to a bump in phishing attacks targeted to financial services customers, we're seeing more spam than we've ever seen before.

Read more