Blogs

Tom Venables

Tom Venables

Recent Posts

Blog
March 04, 2026

SAP Clean Core: Why it matters and how to achieve It

Blog
October 06, 2025

The Perfect Storm: Why Now Is the Time to Bring SAP into Your Enterprise Identity Program

Blog
July 26, 2023

Securing SAP with Zero Trust: Practical approaches and implementation strategies

Blog
July 12, 2023

The Telecommunications Security Act: Four key areas of focus

Blog
June 20, 2023

Fail to Plan, Plan to Fail – Looking at Incident Response

Blog
December 14, 2021

False sense of security: external threat to SAP is more than you think

Blog
July 30, 2021

SAP customers may be operating under false sense of security

Blog
April 15, 2021

Onapsis research shows cyberattacks on critical SAP applications

Blog
January 07, 2021

Challenges of integrating SAP ERP's with Identity Management strategy

Blog
December 02, 2020

Bots are people, too: Robotic Process Automation in finance

Blog
May 14, 2019

What a systems integrator may not explain about S/4 HANA security

Blog
August 19, 2016

How to Enable More Growth by Taking More Risk with More Control

Blog
January 21, 2016

Least Privilege: Stand Up For Your Principles!

Blog
August 06, 2015

Do You Have Trust Issues?

Blog
November 15, 2014

Unlocking Management Information - Part 3

Blog
August 18, 2014

Security Engagement