Blogs

Blog
December 18, 2024

DORA – Digital Operational Resilience for the Financial Services Sector

Blog
November 27, 2024

RISE Right FAQs: Navigating RISE With SAP FUE Licensing

Blog
November 06, 2024

SAP Roles and Authorizations: From basics to best practices

Blog
October 23, 2024

Your Ultimate Resource Hub: Navigating the Intersection of SAP and Enterprise IGA

Blog
October 16, 2024

How to bring SAP into an organisation-wide identity strategy

Blog
October 09, 2024

Infographic: How to unite your SAP and Identity teams

Blog
October 02, 2024

Cyber Security Bill 2024: A New Era for Malaysia's Cybersecurity Landscape

Blog
October 02, 2024

From SAP IdM to enterprise IGA: How to bridge team silos and maximise benefits

Blog
September 24, 2024

SAP IdM End-of-Life and What to Do Next

Blog
August 26, 2024

Integrating Technology and Human Judgement Is Key for Modern Risk Management

Blog
August 19, 2024

Why human risk strategies need to be more ‘human’

Blog
August 12, 2024

AI’s Influence in Human Risk: Common Scenarios and How to Prepare

Blog
August 07, 2024

Click here…but maybe don’t: Why a secure culture matters and how to build one

Blog
August 01, 2024

Ransomware Attacks on SAP: Key Insights from Our Fireside Chat with Onapsis

Blog
July 19, 2024

Fortifying SAP: A guide to securing custom elements in your environment in preparation for your S/4HANA upgrade

Blog
July 15, 2024

Multi-Factor Authentication (MFA) Recovery: Options and Innovations

Blog
June 17, 2024

Navigating the UK Corporate Governance Code: Insights from Industry Peers

Blog
June 12, 2024

Why managing third-party access is critical for modern businesses