Key Insights Blog

Read the latest insights from our experts on GRC and risk management

30 July 2021

SAP customers may be operating under false sense of security find Turnkey and Onapsis

London, 29 July 2021: Many application owners are unaware of how vulnerable their SAP applications m...
15 April 2021

Onapsis research shows active cyberattacks on critical SAP applications - what you should do next

Onapsis’ recently released research shows that SAP systems are not immune from the cyber threats tha...
29 September 2020

Cyber Security: Do you really know when you’re under attack?

We all know that cybersecurity is an ongoing arms race and that threats are growing in size and soph...
18 August 2020

What I have learnt from my recent SAP cybersecurity engagements

While a pre-implementation security acceptance test has been a common feature of any large system im...
14 August 2020

The Next-Gen SAP Systems Audit

In recent years, there has been a drastic change in the focus of SAP technology – transition to S/4 ...
10 August 2020

Ten things CISOs must know about SAP Cyber security

As the IT landscape gets more complex, the difficult job of a Chief Information Security Officer (CI...
4 August 2020

What is SAP Cyber Security, and why is managing SoD insufficient?

SAP technology has changed radically in recent years, and this has had a direct impact on SAP securi...
21 June 2018

Security Considerations for SAP S/4 HANA

This article appeared in E-3 Magazine International on 19th June 2018.
21 January 2016

SAP Data Security With Turnkey Consulting

Richard Hunt chats with SAPinsider's Ken Murphy about governance, risk and compliance (GRC) issues a...
23 October 2015

Access Control 5.3 End Of Life - Time To Upgrade, Or Do You Just Keep The Lights On?

Access Control 5.3 is due to exit “Mainstream Maintenance” and enter Extended Support at the end of ...
6 August 2015

Do You Have Trust Issues?

Security is all about trust. Many organisations talk about trust in various ways, especially where s...
14 February 2014

The Paradox Of Password Rules

Many organisations can expect to see some sort of findings on their audit reports pertaining to thei...
19 December 2013

Common Characteristics Of High Performing Teams

As we come to the end of 2013 I have been thinking of some of the projects that we have been working...
24 October 2013

SAP: The Increasing Cyber Security Threat

The cyber threat to IT systems in on the increase and this time it is not bored teenagers that we ne...
30 October 2012

Emergency Access Logs - What Is Logged And What Isn't?

The SAP GRC Emergency Access Management (EAM) log level has been the subject of a lot of questions a...