All Posts (2717)

Sort by

Alexander Blog backup part 2

SAP Mobile Platform Security: Introduction

Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD

Read more…
Views: 8
Comments: 0

Words of advice-Incident Response Team

Setting up an Security Incident Response Team (SIRT) is a challenging job.

Things To Keep In Mind:

1.Organization's IT assets and required security measures

2.Log of earlier attacks gives an idea on vulnerable assets and attacks areas

3.Organization'

Read more…
Views: 28
Comments: 0

(backup only)Alexander blog backups-

Guideline for Secure Configuring SAP NetWeaver ABAP

With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to

Read more…
Views: 68
Comments: 0

The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology inf

Read more…

We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!

What was the objective of the Community Breakfast?

  • Preview of CPI Findings: T
Read more…

Incident Management Guide: Ways to categorize Incidents

Based on Type of Attack: 

  1. Malware : Malicious code has been successfully  logged into business infrastructure

  2. Unauthorized access (user/admin/other privilege escalations) : Any privilege escalations or access gained which should otherwise be denied
Read more…
Views: 32
Comments: 0

Join The Community Discussion