Skip to content
Menu
Facebook Twitter Youtube Behance
ZoomDetails

IT & SAP Security Analysis

News, ServiceBy hstumm25. April 2023Leave a comment

An IT security audit, also known as an IT security audit or assessment, is critical to an organization’s cybersecurity strategy.

ZoomDetails

Artificial Intelligence, Security and a New Industrial Revolution – Cyber Edition

NewsBy hstumm23. January 2023

The ease and pervasiveness of AI integration is sending shockwaves into the IT security industry as well. We have been involved in research for years

ZoomDetails

Risk Management & Strategy

ServiceBy hstumm23. January 2023

Security and risk management is critical to protecting your business from the growing threat of IT incidents

ZoomDetails

SIEM Solutions & IT Security Law

NewsBy hstumm23. January 2023Leave a comment

Security Event Management (SIEM) systems are a basic prerequisite for effective monitoring of IT systems.

ZoomDetails

SAP Security Tuesday Patches

WebinarBy hstumm22. January 2023Leave a comment

What’s new on the patch Tueday

ZoomDetails

Protection of SAP transports

News, ServiceBy hstumm22. January 2023

A new attack vector shows a high risk potential for external SAP transports

ZoomDetails

SAP Pen Test

ServiceBy hstumm14. September 2021Leave a comment

Cloud, SAP BTP, internal networks and SAP landscapes or SAP systems exposed to the Internet with FIORI – we are the leading contact in the SAP security world for all these topics.

ZoomDetails

Secure ABAP source code

ServiceBy hstumm14. September 2021Leave a comment

SAP ABAP – custom application development is consistently one of the main attack vectors for criminal activity and fraud

ZoomDetails

Industrial OT & IOT – Hardware Security

By hstumm14. September 2021Leave a comment

Ut sit amet semper arcu. Proin eget ex convallis eu viverra lorem pretium. Morbi dapibus a tellus.

ZoomDetails

Pen Test on Cloud Solutions & SAP BTP

ServiceBy hstumm1. March 2021

External applications and cloud solutions, not only in the area of SAP, require special attention in the area of IT security

→12→

© log(2) oHG – 2023. All rights reserved.log(2)

Go to Top
  • log(2) – About us
  • Products and services
  • Privacy
  • Contact
  • Blog EN
  • English
    • Deutsch
Behance
  • log(2) – About us
  • Products and services
  • Privacy
  • Contact
  • Blog EN
  • English
    • Deutsch
Twitter
  • Deutsch (German)
  • English