Blogs

Popular topics:
  • GRC
  • SAP Security
  • IAM
  • Managed service
Blog
April 26, 2026

AI in SAP: Balancing Opportunity, Risk, and Control

Blog
April 23, 2026

Six reasons why you need a modern PAM approach to manage machine identities

Blog
April 15, 2026

Five questions to guide your move to GRC for HANA 1.0

Blog
April 01, 2026

How to Manage Privileged Access in Modern Retail IT Environments

Blog
March 18, 2026

The Next Generation of GRC: What It Means for SAP Customers

Blog
March 13, 2026

Missed TAC CCR 2026? Here are the 3 big takeaways

Blog
March 04, 2026

SAP Clean Core: Why it matters and how to achieve It

Blog
February 26, 2026

How to start with continuous controls monitoring in SAP

Blog
February 19, 2026

The rise of non-human and agentic identities and how to manage them

Blog
February 03, 2026

Fully Managed: A Simplified Approach to Privileged Access Management

Blog
January 26, 2026

SAP Vulnerability Management Has Never Been More Important: Here Are Our 7 Top Tips

Blog
January 12, 2026

Why most S/4HANA programs fail to deliver business value

Blog
January 07, 2026

SAP Security, GRC, and IAM in 2026: What's coming and what does it mean for you?

Blog
December 22, 2025

SAP GRC 2026: Your questions answered

Blog
November 26, 2025

How to build SAP roles that fit your business: A modular approach

Blog
November 19, 2025

Managing your SAP security responsibilities: How managed security services can fill the gaps

Blog
November 06, 2025

From IT Challenge to Enterprise Opportunity: Rethinking Privileged Access Management

Blog
October 29, 2025

How Two Organizations Slashed Their SAP License Costs, and How You Can Too

Blog
October 13, 2025

5 Best Practices for Vulnerability Management and Patching

Blog
October 06, 2025

The Perfect Storm: Why Now Is the Time to Bring SAP into Your Enterprise Identity Program

Blog
September 22, 2025

Carsten Hufnagel Appointed Managing Director for Germany

Blog
September 10, 2025

The stakeholder-centric approach to PAM business cases (and why it delivers better ROI)

Blog
September 03, 2025

8 Premier Security Industry Events to Attend in Q4 2025

Blog
August 20, 2025

Stick With SAP GRC or Switch? Evaluating Your Full Range of GRC Options

Blog
August 20, 2025

Turning the new SAP FUE license model into an opportunity

Blog
August 05, 2025

How to Make the Business Case for Security Managed Services

Blog
July 30, 2025

AI for Finance Teams: How to Start Focused, Build Smart, and Scale Seamlessly

Blog
July 21, 2025

Integrity, Community, Expertise: Introducing Turnkey's Core Values

Blog
July 14, 2025

10 Success Factors for Your PAM Program Implementation

Blog
July 02, 2025

Don’t Panic! SAP GRC Modernization Is Actually a Huge Opportunity

Blog
June 25, 2025

Strategic Incident Response: Your Path to Faster Recovery and Stronger Resilience

Blog
June 19, 2025

Redefining Enterprise Protection: How Modern Security Teams Can Lead Change

Blog
June 11, 2025

Top 5 SAP IdM Alternatives and How to Choose Which Is Right for You

Blog
June 05, 2025

The Shared Responsibilities of SAP Security in the Cloud: What You Own, What SAP Manages, and Why It Matters

Blog
May 29, 2025

The PAM Advantage: How to Deliver Automation and Compliance in a Single Strategic Move

Blog
May 22, 2025

Four Ways Specialized Security Managed Services Transform Enterprise Protection

Blog
May 12, 2025

Annaya Devaiah Appointed Identity and Access Management Practice Director in APAC

Blog
May 08, 2025

Why Security Teams Need A People-First Approach

Blog
April 30, 2025

UK Corporate Governance: How to Respond to Provision 29

Blog
April 10, 2025

Five steps to a secure & successful SAP S/4HANA migration

Blog
April 09, 2025

Security as a Business Enabler: How Performance-Focused Security Drives Growth

Blog
April 01, 2025

Strengthen Your Three Lines of Defense with SAP Risk and Assurance Management (SAP RAM)

Blog
March 18, 2025

Best Practice IT Governance and Risk Management Frameworks: Your Journey to Digital Enterprise Resilience

Blog
March 07, 2025

Celebrating Women in Cybersecurity: Voices from Turnkey

Blog
March 07, 2025

Survey Says...These Are Security Teams' Top Priorities In 2025

Blog
February 25, 2025

Shifting the Security Paradigm through People, Protection, and Performance

Blog
February 20, 2025

Security as a Driver of Growth: A Vision for Our Industry

Blog
February 18, 2025

Join Turnkey in Budapest at TAC's SAP for Internal Controls, Compliance and Risk Management Conference 2025

Blog
February 06, 2025

Navigating DORA: Country-Specific Requirements for Financial Services

Blog
February 05, 2025

How to Prepare Your Internal Audit Function for 2025’s New Global Internal Audit Standards

Blog
February 05, 2025

How Turnkey Helped One Company Halve Their SAP Licenses

Blog
January 29, 2025

Four challenges of SAP license reviews and how to navigate them in the FUE era

Blog
January 20, 2025

Six Questions to Ask When Evaluating a Security Managed Service Provider

Blog
January 09, 2025

SAP FUE Licensing: How to Reduce Costs and Improve Security

Blog
December 18, 2024

DORA – Digital Operational Resilience for the Financial Services Sector

Blog
November 27, 2024

RISE Right FAQs: Navigating RISE With SAP FUE Licensing

Blog
November 06, 2024

SAP Roles and Authorizations: From basics to best practices

Blog
October 23, 2024

Your Ultimate Resource Hub: Navigating the Intersection of SAP and Enterprise IGA

Blog
October 16, 2024

How to bring SAP into an organisation-wide identity strategy

Blog
October 09, 2024

Infographic: How to unite your SAP and Identity teams

Blog
October 02, 2024

Cyber Security Bill 2024: A New Era for Malaysia's Cybersecurity Landscape

Blog
October 02, 2024

From SAP IdM to enterprise IGA: How to bridge team silos and maximise benefits

Blog
September 24, 2024

SAP IdM End-of-Life and What to Do Next

Blog
August 26, 2024

Integrating Technology and Human Judgement Is Key for Modern Risk Management

Blog
August 19, 2024

Why human risk strategies need to be more ‘human’

Blog
August 12, 2024

AI’s Influence in Human Risk: Common Scenarios and How to Prepare

Blog
August 07, 2024

Click here…but maybe don’t: Why a secure culture matters and how to build one

Blog
August 01, 2024

Ransomware Attacks on SAP: Key Insights from Our Fireside Chat with Onapsis

Blog
July 19, 2024

Fortifying SAP: A guide to securing custom elements in your environment in preparation for your S/4HANA upgrade

Blog
July 15, 2024

Multi-Factor Authentication (MFA) Recovery: Options and Innovations

Blog
June 17, 2024

Navigating the UK Corporate Governance Code: Insights from Industry Peers

Blog
June 12, 2024

Why managing third-party access is critical for modern businesses

Blog
May 29, 2024

Privileged Access: What it means and how to manage it

Blog
May 23, 2024

Turnkey Receives SailPoint Delivery Admiral Partner Designation

Blog
May 21, 2024

IAM and SAP Integration: What SAP teams need to know to work better with Identity teams

Blog
May 21, 2024

IAM and SAP Integration: What Identity teams need to know to work better with SAP teams

Blog
March 13, 2024

Why security should take centre stage in your S/4HANA migration

Blog
March 06, 2024

How to empower your teams with a security-first S/4HANA migration

Blog
March 04, 2024

How might we improve Identity and Access Management within Higher Education

Blog
February 23, 2024

Turnkey awarded SailPoint Partner of the Year for APAC

Blog
February 16, 2024

Traceability in the French Nuclear Industry on SAP: Compliance and Cybersecurity

Blog
February 08, 2024

20 Years of Turnkey: From the kitchen table to a global company

Blog
November 22, 2023

Creating a secure culture: A practical guide

Blog
November 21, 2023

Turnkey appoints new non-executive director; Emily Harnish brings CMO expertise and US market insight to global board

Blog
November 14, 2023

Four overlooked areas of human risk management

Blog
November 09, 2023

Turnkey’s Sarah Nadwick is the Highly Commended Rising Star at the ‘Oscars of IT’

Blog
November 07, 2023

Why Human Risk Needs to be a Top Priority

Blog
September 26, 2023

Everything You Need To Know About Risky Business 2023

Blog
August 24, 2023

Turnkey’s Sarah Nadwick selected as finalist in 2023 BCS & Computing UK IT Industry Awards

Blog
August 15, 2023

Turnkey Consulting Promotes Cavan Arrowsmith to UK Managing Director, Freddie Fleetham to CFO, and Tom Venables to US Solutions Director

Blog
July 26, 2023

Securing SAP with Zero Trust: Practical approaches and implementation strategies

Blog
July 12, 2023

The Telecommunications Security Act: Four key areas of focus

Blog
June 20, 2023

Fail to Plan, Plan to Fail – Looking at Incident Response

Blog
June 20, 2023

Unveiling the Secrets of Identity Management: SailPoint Horizon's of Identity Roadshow Recap

Blog
June 14, 2023

BizTechAsia - A Turnkey interview with Richard Hunt

Blog
May 22, 2023

Bridging the Gap: The Crucial Role of Security in Connecting Business and IT Leaders

Blog
May 18, 2023

Turnkey Consulting recognised in inaugural government awards for export success

Blog
May 02, 2023

Starter Package for SAP Financial Compliance Management Now Available on SAP® Store

Blog
March 08, 2023

Turnkey Consulting welcomes Liane Israel as Sales Director for North America

Blog
March 01, 2023

Why SAP should be included in your Enterprise Identity Strategy

Blog
February 09, 2023

Rev-Trac and Turnkey Consulting join forces to combat SAP cyberattacks

Blog
January 27, 2023

Turnkey hires Brian MacFarland to expand North American footprint

Blog
December 07, 2022

Cyber security lessons learnt from the 2022 FIFA World Cup

Blog
July 26, 2022

Turnkey appoints Rob Tyler to new role of APAC practice director

Blog
July 25, 2022

The expert view on preparing for UK SOX

Blog
May 27, 2022

Turnkey appoints UKISUG’s Matt Dale to coordinate strategic partners

Blog
March 29, 2022

Lessons learnt from 2022 Cloud and Cyber Security Expo

Blog
March 21, 2022

Deploying a “zero-trust” approach to SAP Security

Blog
March 08, 2022

Best practices when implementing Business Role Management for SAP GRC

Blog
January 20, 2022

Implementing Business Role Management in SAP GRC - Best Practices

Blog
December 14, 2021

False sense of security: external threat to SAP is more than you think

Blog
November 16, 2021

SECUDE International AG and Turnkey's Strategic Technology Partnership

Blog
November 01, 2021

Why are businesses putting IAM at the centre of their digital journey?

Blog
October 28, 2021

Turnkey Germany makes the Switch to Electric Vehicles

Blog
October 05, 2021

How to secure an SAP S/4 transformation project

Blog
August 17, 2021

Galvanize Announces a Strategic Partnership with Turnkey Consulting

Blog
July 30, 2021

SAP customers may be operating under false sense of security

Blog
June 30, 2021

Le partenariat Turnkey et NTT DATA étendu à la France

Blog
April 28, 2021

UK SOX: Get ready with controls automation

Blog
April 21, 2021

How to get the most out of the Integrated Risk Management Forum 2021

Blog
April 15, 2021

Onapsis research shows cyberattacks on critical SAP applications

Blog
March 15, 2021

Turnkey highlights SME sector’s key role in tackling climate change

Blog
March 10, 2021

Announcement: Turnkey and LegionStar joint venture

Blog
January 25, 2021

How SAP GRC users can utilise dashboards without Adobe Flaash

Blog
January 07, 2021

Challenges of integrating SAP ERP's with Identity Management strategy

Blog
December 09, 2020

Risk Management in 2021: A changing risk landscape

Blog
December 02, 2020

Bots are people, too: Robotic Process Automation in finance

Blog
November 05, 2020

Announcement: Turnkey and ABEX Partnership

Blog
October 20, 2020

A fear of cyber threats? Why you're not being paranoid...

Blog
September 29, 2020

Cyber Security: Do you really know when you’re under attack?

Blog
September 10, 2020

South Central Ambulance Service automates business processes - Turnkey

Blog
August 18, 2020

What I have learnt from my recent SAP cybersecurity engagements

Blog
August 14, 2020

The Next-Gen SAP Systems Audit

Blog
August 11, 2020

Putting Out Fires: Ensuring Privileged Access Management With SAP Firefighter

Blog
August 10, 2020

Ten things CISOs must know about SAP Cyber security

Blog
August 04, 2020

What is SAP Cyber Security, and why is managing SoD insufficient?

Blog
July 08, 2020

Why now is the time to upgrade to SAP GRC 12.0

Blog
July 07, 2020

Risk management planning for business disruption

Blog
June 30, 2020

Turnkey brings GRC, IDAM and cybersecurity expertise to French market

Blog
May 28, 2020

How would an audit describe your privileged access posture?

Blog
May 21, 2020

The financial benefits of integrating SAP SuccessFactors & SAP GRC

Blog
April 20, 2020

7 ways to include cyber security in your business continuity plans

Blog
April 03, 2020

5 tips on staying secure when working from home

Blog
March 31, 2020

‘Zoom-bombing’ - minimising the risk of virtual hangouts

Blog
March 26, 2020

69% of SAP users believe SAP projects do not prioritise IT security

Blog
December 12, 2019

Why ask a generalist system integrator to look after your security?

Blog
December 10, 2019

Turnkey appoints former PwC partner Jonathan Tate as first chairman

Blog
November 12, 2019

The cloud needs security by design

Blog
October 30, 2019

Risk management must go beyond spreadsheets

Blog
October 24, 2019

The operational approach to integrated risk management

Blog
October 11, 2019

How SAP GRC can accelerate integrated risk management (IRM)

Blog
September 20, 2019

Avoiding security remediation in SAP S/4 HANA projects

Blog
August 29, 2019

Why SAP access management should extend beyond the application layer

Blog
July 26, 2019

Managing today's SAP risks: the key questions

Blog
June 21, 2019

The security risks of increased mobility with SAP S/4 HANA

Blog
June 04, 2019

How SAP ETD assists with cyber-security

Blog
May 14, 2019

What a systems integrator may not explain about S/4 HANA security

Blog
April 04, 2019

How to create a risk management framework to deal with Brexit

Blog
February 18, 2019

Managing SAP's automated access termination process

Blog
January 16, 2019

Should you outsource your risk and compliance activities?

Blog
December 14, 2018

Wem geben Sie (Cloud) Zugriff auf Ihre Daten

Blog
October 23, 2018

The rise of robotic process automation in centralising controls

Blog
October 22, 2018

Why you need to upgrade from SAP IDM 7.2 to 8.0

Blog
October 12, 2018

Preparing in the face of ongoing uncertainty

Blog
September 25, 2018

Just owning SAP GRC is not enough

Blog
July 27, 2018

Understanding the role of HR in identity and access management

Blog
July 05, 2018

Five key benefits of SAP GRC 12.0

Blog
June 21, 2018

SAP S/4 HANA security considerations

Blog
March 09, 2018

[PRESS RELEASE] Turnkey provides exclusive review of the new SAP GRC 12.0

Blog
February 12, 2018

SAP's GRC 12.0 is moving towards Fiori

Blog
February 01, 2018

SAP skills: why contractor hire is not the only option

Blog
January 19, 2018

Understanding Privacy by Design to comply with the GDPR

Blog
November 21, 2017

Turnkey's Celebration of 10 years in Australia feature in E-3 Magazine

Blog
November 15, 2017

Is hiring an SAP contractor your only option?

Blog
November 08, 2017

The Top 5 signs you need a role re-design

Blog
November 02, 2017

[PRESS RELEASE] Turnkey celebrates 10 Years in Australia and expands to New Zealand

Blog
July 26, 2017

How GRC is changing the face of internal controls

Blog
June 29, 2017

Is the CFO’s office the right place for GRC?

Blog
June 20, 2017

With so many threats how prepared are retailers for a disruptive event

Blog
May 11, 2017

Are you facing a capability gap for SAP security?

Blog
January 19, 2017

Risks Management: The IoD’s New Directors Competency Framework

Blog
January 13, 2017

Is your CISO now more valuable than your CMO in protecting your brand?

Blog
October 05, 2016

How to Choose Between GRC Consultancy and GRC as a Service

Blog
September 19, 2016

3 steps to a controls-based approach to financial statement audits

Blog
September 02, 2016

Outsourcing the IT Systems Audit: Why Not?

Blog
August 25, 2016

The 5 Key Business Benefits of SAP's S/4HANA

Blog
August 19, 2016

How to Enable More Growth by Taking More Risk with More Control

Blog
August 12, 2016

3 things every CEO needs to know about the new GDPR

Blog
August 05, 2016

7 things Directors should know: FRC Risk Management responsibilities

Blog
July 14, 2016

How to protect SAP within your Data Centre

Blog
June 21, 2016

Day 2 Round-up Vlog from GRC 2016 Vienna

Blog
June 17, 2016

Turnkey’s GRC 2016 Preview

Blog
June 16, 2016

Are 3 Lines of Defence Enough? Introducing the 4th Line of Defence

Blog
April 29, 2016

The importance of an integrated approach to GRC across your enterprise

Blog
April 22, 2016

Bringing Technology into the Boardroom

Blog
April 15, 2016

Learn why surveys are essential in your toolset for gaining assurance over internal controls

Blog
March 17, 2016

Day 3 Round-up Vlog From The GRC 2016 Event

Blog
March 17, 2016

Day 2 Round-up Vlog From The GRC 2016 Event

Blog
February 26, 2016

GRC As A Service – Achieving And Operating A Quality Solution

Blog
January 21, 2016

Least Privilege: Stand Up For Your Principles!

Blog
January 13, 2016

Cost – A Barrier To GRC As A Service?

Blog
October 23, 2015

Access Control 5.3 End Of Life - Time To Upgrade, Or Do You Just Keep The Lights On?

Blog
October 22, 2015

Controls Automation - Monitoring vs. Operation - Part 3

Blog
October 02, 2015

Controls Terminology And Traditional Controls - Part 1

Blog
August 06, 2015

Do You Have Trust Issues?

Blog
July 12, 2015

Evolving Challenges Require Evolving Skills

Blog
May 06, 2015

Process Controls Webinar – Overview & Business Benefits

Blog
November 15, 2014

Unlocking Management Information - Part 3

Blog
August 18, 2014

Security Engagement

Blog
February 14, 2014

The Paradox Of Password Rules

Blog
October 24, 2013

SAP: The Increasing Cyber Security Threat

Blog
November 30, 2012

GRC Process Control - It's All About Risk (Part 2)

Blog
November 02, 2012

GRC Process Control - It's All About Risk (Part 1)

Blog
October 30, 2012

Emergency Access Logs - What Is Logged And What Isn't?

Blog
October 24, 2012

Taking A Top Down Approach To Your SAP GRC Deployment

Blog
August 02, 2012

An Integrated Approach To SAP GRC Access Controls (Part 1)