Industry Insights
Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Build a Strong SAP Security Strategy With the NIST Framework
Originally published by Onapsis. Written by JP Perez-Etchegoyen, CTO, Onapsis. Business applications like SAP are responsible for running the enterprise, powering operations and fueling the global economy. Considering 77% of the world’s transactional revenue touches an SAP system and 92% of the F...
Unpatched ERP Vulnerabilities Haunt Organizations
Originally published by Onapsis. The challenge of how to identify vulnerabilities, prioritize patches, and prevent cyberattacks targeting business-critical Enterprise Resource Planning (ERP) data and systems is keeping cybersecurity professionals up at night. Don’t let unpatched ERP vulnerabili...
What is ERP Security?
Originally published by Onapsis on October 6, 2022. This month marks CISA’s 19th Cybersecurity Awareness Month, a joint effort between the government and public to raise awareness of the importance of cybersecurity. This year's theme, "See Yourself in Cyber," demonstrates that while cybersecurity...
The Need for SAP Security in the Utilities Sector
Originally published by Onapsis here. It’s no secret cyberattacks have become more advanced over the last few years. Industries that are critical to everyday life have seen, firsthand, the debilitating impact cyberattacks can have. Critical infrastructure, such as the informational technology (IT...
What is SAP Security (and Why Does It Matter?)
Originally published by Onapsis here. An Overview of SAP Applications Business-critical applications such as ERP, SCM, CRM, SRM, PLM, HCM, BI and others support essential business functions and processes of the world’s largest commercial and governmental organizations, including supply chain, man...
SAP S/4HANA: 5 Ways to Build In Security From the Start
Originally published by Onapsis here. Many SAP customers are currently at the point of either planning or executing a transformation to SAP’s next generation ERP, S/4HANA. More than 18,800 companies[1] have adopted SAP S/4HANA and thousands more are in the process of migrating to the new platform...
Overview of Critical Controls for Oracle Cloud Applications
CSA’s Enterprise Resource Planning (ERP) Working Group is pleased to release the latest in a series of security guidance for deploying ERP systems in the cloud. This latest whitepaper focuses on Oracle Cloud Applications. Oracle Cloud Application clients share with Oracle Corporation the respo...
Leveraging CSA to React to Critical Risks
Written by JP Perez-Etchegoyen, CTO, Onapsis On February 8th, 2022, SAP released its SAP Security Notes as part of the monthly cadence of releasing security patches. This last patch Tuesday was noteworthy due to the release of patches for critical, unauthenticated, HTTP exploitable vulnerabilitie...
Critical Controls for Oracle E-Business Suite
Written by Mike Miller, OnapsisOver the past months, cyber threat activity has increased to unprecedented levels, with threat actors expanding their capabilities to target critical infrastructure and mission-critical applications. From hacktivists to cyber-criminals and state-sponsored, these act...
Why Is Cybersecurity Critical in Protecting Infrastructure?
Written by Angela Stone, Content Creator, Eleven Fifty AcademyCybersystems, assets, and physical infrastructure are vital to the economy of a country. Destroying or incapacitating infrastructure and cyber systems can have a devastating impact on the economy. Industries such as the oil and gas ind...
Using CSA’s Implementation Guide for SAP to securely migrate and operate ERP applications in the cloud.
By Juan Perez-Etchegoyen, chair of the Enterprise Resource Planning working group, and CTO of Onapsis.With the increasingly growing adoption of cloud models across Enterprise Resource Planning (ERP) applications, organizations need to increase the level of attention and controls provided to the ...
RECON (CVE-2020-6287) and its impact on Cloud Applications
By Shamun Mahmud, Sr. Research Analyst at Cloud Security AllianceKey takeawaysCloud adoption is growing when it comes to ERP ApplicationsERP Applications in the cloud can be vulnerable security issues and organizations need to apply the proper security controls and patches.IntroductionThe RECON v...
It's Time for Security Leadership to Embrace the Cloud-First Future
By Arif Kareem, CEO and President at ExtraHop NetworksOn the campus at Stanford Business School is a plaque engraved with a quote from Phil Knight, graduate of the business school and co-founder of Nike. I've visited the campus many times, and each time the words stop me in my tracks."There comes...
CSA Issues Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers
By Victor Chin, Research Analyst, Cloud Security AllianceCloud technologies are being increasingly adopted by organizations, regardless of their size, location or industry. And it’s no different when it comes to business-critical applications, typically known as enterprise resource planning (ERP)...
Browse by Topic
Write for the CSA blog
Submit your blog proposalSign up to receive CSA's latest blogs
This list receives 1-2 emails a month.