Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

SAP Security Podcasts

show episodes
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Transformation Every Day

Alexander Greb & Johannes Langguth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Expert Insights and Stories on SAP and beyond. Transformation Every Day is the podcast for anyone passionate about Digital Transformation done right in the SAP universe. Join hosts Alexander Greb and Johannes Langguth, along with leading experts from SAP and beyond, as they dive deep into what successful digital transformation really takes. Get ready for candid conversations, inspiring experts insights, best practices and practical strategies to drive impactful change in your organization.
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
The ERP & Data Management News Briefing delivers concise, actionable updates on the technologies, strategies, and players shaping enterprise resource planning and data management. Each episode distills the latest developments in software, cloud platforms, analytics, and governance—helping IT leaders, business analysts, and decision-makers stay ahead without wading through endless reports. From new vendor launches to emerging best practices in integration, security, and compliance, you’ll get ...
  continue reading
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
Artwork

1
State of the CIO

Dan Kelly

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
State of the CIO features senior IT professionals from leading organizations across America. Talking points on the show include the role of the CIO in business transformation, innovative AI implementation, and consumer engagement as a path to growth. Tune in every week to hear insights from the leading lights of enterprise Information Technology.
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
  continue reading
 
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
  continue reading
 
Loading …
show series
 
Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as …
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
Today's episode is hosted by Ethan Little and they are joined on the podcast by Anupam Goyal, Head of Finance Core at Scania Group, Ramu Katepalli, SAP Global Program Manager at HCLTech and Halvor Belbo Lukerstuen, Director of Human Experience Management at NTT DATA Business Solutions Nordics. The conversation explores how organisations move from r…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical series episode, we unpack one of the most important building blocks in SAP authorisations: single roles. Our experts explore the different ways organisations design single roles to balance provisioning efficienc…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
Today's episode is hosted by Chris Hackett and they are joined on the podcast by Maryem Nasri, Global Data Governance Coordinator at Ericsson, Diane Reynolds, Head of Business Development Group Risk at SEB and Mathias Goeltzner, Regional OBS Coordinator at Tesla.The conversation explores how organisations navigate the tension between regulation and…
  continue reading
 
Today's episode is hosted by Chris Hackett and they are joined on the podcast by Christopher Bosch, CISO at Evolved Aerospace and Elisia Chessel, Senior Security Architect at Klarna.The conversation explores how organisations can strengthen their approach to security and GRC by effectively engaging senior leadership. Through a broad discussion on c…
  continue reading
 
Today's episode is hosted by Alvin Boampong and they are joined on the podcast by Shrutakeerti Behura, Technical Lead at Volvo Cars and Fredrik Vanbruggen, DevOps Lead at Precise Biometrics.The conversation explores how organisations can cultivate environments where developers feel motivated, supported and empowered to excel. By examining practical…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
  continue reading
 
Guest: Jon Reed - CoFounder diginomica - Enterprise Analyst Host: Alexander Greb - Consulting Director - cbs corporate business solutions Summary: In this conversation, Jon Reed discusses the role of AI in business transformation, emphasizing that AI should be viewed as an accelerant rather than a standalone solution. He highlights the importance o…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Today's episode is hosted by Chris Hackett and they are joined on the podcast by Staffan Fredriksson, CISO at Regent AB, Konrad Jelen, Director of Data & AI at KOLOMOLO and Johan Lido, Chief Architect and Architect Manager at AFA Försäkring.The conversation explores the evolving intersection of security and AI, reflecting on how organisations can r…
  continue reading
 
Today's episode is hosted by Alvin Boampong and they are joined on the podcast by Sara Razavi, Solutions & Cloud Ecosystem Program Lead at Ericsson, Vikas Kumar, Senior Cloud Advisor and Irfan Shadeque, Business Infrastructure Manager at Volvo Group.The conversation explores how organisations can build and lead high-performing cloud teams that supp…
  continue reading
 
Today's episode is hosted by Ethan Little and they are joined on the podcast by Jonas Grahm, Strategy Execution Data Management & Owner at Orbiting Portfolio, Mathias Arvidsson, Cofounder & CEO at Norrminds and Pritam Sarkar, IT Manager at Scania.The conversation explores how leaders can build a future-proof strategy that supports long-term resilie…
  continue reading
 
Today's episode is hosted by Georgia Benton and they are joined on the podcast by Valeria Viana Gusmao, Senior Technical Lead & Engineering Manager at Strawberry, Sarwarul Rizvi, Engineering Manager at Keystone Education Group, Sunilraj Sudhakar, Product Coach & Business Agility Consultant at Ericsson and Sawan Budhbhatti, General Manager & Softwar…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
  continue reading
 
Guest: Marc Priestley - Ex-Chief Mechanic - McLaren Racing Formula One Host: Alexander Greb - Consulting Director - cbs corporate business solutions Summary: Former McLaren Chief Mechanic Marc Priestley reveals how World Champion Formula One teams think, innovate, and adapt under extreme pressure — and why that mindset is exactly what most SAP tran…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
Today's episode is hosted by Ethan Little and they are joined on the podcast by Johan Söderström, Senior Advisor and Enterprise Lead at Implema, Toni Forsberg, Digital Transformation Manager for Global Finance at Ericsson, Vaishnavi Kumar, Program Manager for Data AI Analytics SAP Master Data at H&M Group and Halvor Belbo Lukerstuen, Director of Hu…
  continue reading
 
Today's episode is hosted by Sophie Gould and they are joined on the podcast by Erik Zindel, VP Hydrogen & Decarbonization Strategy at Siemens Energy.The conversation explores how organisations are shaping the future of sustainable energy through long-term thinking and visionary leadership. As the discussion unfolds, it highlights the strategic rol…
  continue reading
 
Today's episode is hosted by Martha Rayner and they are joined on the podcast by Alfez Lindström, CX Solution Architect / Retail Lead, Microsoft Dynamics at Fujitsu, Ove Bristrand, Digital Business Manager and Owner at NetIntegrate and Fredrik Lindgren, Senior Sales Executive, AI Business Process at Microsoft Sweden.The conversation explores how ne…
  continue reading
 
Today's episode is hosted by Martha Rayner and they are joined on the podcast by Mårten Damm, Senior Consultant M-Files at Columbus, Joe Mehanna, Project & Service Delivery Manager at Fellowmind Sverige, and Shruti Moudgil, Regional Implementation Manager at Scania Group.The conversation explores the evolving role of Dynamics consultants, highlight…
  continue reading
 
Today's episode is hosted by Sam Russell and they are joined on the podcast by Hanna Isacson, Product Manager, AI & Automation at ICA Gruppen, Nicolas Nikula, Director, Analytics / Processes / Systems at Fiskars Group, and Ata Marzban, Team Lead, Engineering & AI Product at Klarna Bank.The conversation explores the impact of artificial intelligence…
  continue reading
 
Today's episode is hosted by Alvin Boampong and they are joined on the podcast by Markus Kamarik, Head of Infrastructure at OptiGroup, Garun Awasthi, Cloud Specialist at SEB, Albina Abdulina, Head of Cloud Integration at Keolis Sverige AB, and Viktor Junling, Head of Cloud CoE at If Insurance.The conversation explores balancing cloud innovation wit…
  continue reading
 
Detection engineering just got real! Eden Naftali and Amitai sit down with detection engineering powerhouse Alex Hurtado - and it's a must-listen for anyone in cloud security. 👇 🔍 What's inside: The evolution of detection engineering in the cloud — and why traditional rules no longer apply Why DIY detections > vendor defaults How AI is reshaping de…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Künstliche Intelligenz verändert die Innovationsprozesse von Unternehmen – aber nur, wenn sie sicher ist. In diesem Gespräch erklärt Stefan Bamberg, Director Sales and Key Account Management bei Wibu-Systems, wie Schutz, Lizenzierung und Compliance das Fundament für vertrauenswürdige KI und nachhaltige Geschäftsmodelle bilden. Highlights: Die doppe…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. Introducing Our Technical Series: The Building Blocks of SAP Role Design. In the first episode of our new Technical Series, we unpack the foundations of SAP authorisations — what they are, how they function, and why they matte…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical podcast episode, we dive deep into a crucial piece of the SAP authorisation puzzle — authorisation default values. You’ll discover: How authorisation defaults determine which checks are performed during…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
Today's episode is hosted by Alvin Boampong and they are joined on the podcast by Tanusree Mukherjee, Test & Release Manager at Ericsson, Kalyan Routhu, DevOps Lead and AI Area Lead, Christoffer Forsberg, Cloud Manager at Infor, and Miguel Chourio, Team Lead at Ericsson.The conversation explores the evolving role of DevOps in modern technology ecos…
  continue reading
 
Today's episode is hosted by Alvin Boampong and they are joined on the podcast by Alok Gupta, System Manager for Cloud and NFVI at Ericsson, Jimmy Stahl, Senior Cloud Architect at Länsförsäkringar, Can Onatli, Head of IT Infrastructure & Operations at Life Europe AB, and Praveen Joshi, Head of Technology Business Operations at Ericsson.The conversa…
  continue reading
 
Today's episode is hosted by Georgia Benton and they are joined on the podcast by Tomas Duhourq, Engineering Manager at Spotify, Kaia Hillier, Director of Product Operations at Epidemic Sound, Ashley Westcott, Head of Product at Klarna, and Sunil Subramanian, Head of Product at Volvo.The conversation explores how technology leaders approach collabo…
  continue reading
 
🔍 From discovering VS Code supply chain risks → to uncovering Redis Shell vulnerabilities. Eden Naftali and Amitai sat down to unpack: 👇 How VS Code extensions became a critical supply chain risk (w/ Rami McCarthy) What RediShell reveals about attacker innovation Where AI is being weaponized in modern malware 🎙️ Listen now to our NEW Crying Out Clo…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play