Results for

Sort by:
  • Blog
    February 7, 2024
    By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now considered “table stakes” for meeting minimum requirements for cyber insurance policies, Sarbanes-Oxley (SOX) compliance or alignment with industry leading security frameworks. A mature IAM program also provides significant operational efficiencies via…
  • Blog
    February 14, 2024
    The challenge: Companies in the energy and utilities (E&U) industry are moving fast to adopt artificial intelligence (AI), including generative AI, to increase their competitive edge. But while AI can help these firms to drive innovation, boost profitability and reduce certain risks, it also increases their exposure to cyber threats. Why it matters: Cybersecurity risk has become…
  • Blog
    February 13, 2024
    In the dynamic landscape of SAP S/4HANA implementations, the critical aspects of security, governance, risk and compliance (GRC) and controls demand meticulous attention. Transformation of business processes presents an opportunity to revamp the enterprise application security to stay compliant and secure, in effect satisfying the needs of the auditors and business stakeholders. IT leaders know…
  • Blogs
    February 21, 2024
    Das EU Parlament sowie der EU Rat haben sich auf einen Vorschlag geeinigt, bestimmte Fristen für die Annahme der Richtlinie über die Sustainability Reports von Unternehmen (CSRD) zu verschieben.
  • Blog
    July 27, 2015
    We have a sweet deal for you to a hot destination attended by the smartest people in the business, featuring state-of-the-art SAP customer stories that add up to, yes, you got it, the only cool SAP Analytics and BusinessObjects event of the year, SABOC. Starting Monday (July 27th) morning at 12:01 am CT, and running for three days only, you save: $500 if you register on Day 1 $400 if you…
  • Podcast Transcript
    October 31, 2023
    It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt
  • Blog
    November 13, 2023
    Driving the news: The U.S. Securities and Exchange Commission (SEC) has charged SolarWinds and its CISO for fraud and internal control failures relating to cybersecurity risks. Why it matters: These charges highlight the importance of implementing strong controls and disclosing known concerns to investors. In its complaint, the SEC alleges that SolarWinds and its CISO misled investors…
  • Blog
    February 8, 2017
    Starting with SAP HANA 2.0 we can now partition a single table between in-memory storage and SAP HANA Extended Storage (AKA.. Dynamic Tiring). This is an excellent feature because it simplifies the… Source: Multistore Table Partitions in SAP HANA 2.0
  • Blog
    November 14, 2023
    While the various forms of artificial intelligence (AI) have captured the imagination of nearly everyone in the business world, generative AI (GenAI) is rapidly becoming the hottest new kid on the block. We’ve seen the terms AI and GenAI being used synonymously but there are many types of AI. GenAI is the latest one and represents the ability of a model to create novel output. GenAI is a big…
  • Blog
    November 15, 2023
    This post is the third and final in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity; the second explored the high cost of gender bias in cybersecurity. Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in…
Loading...