• SAP HANA: What are the big benefits of an often-underestimated log source?

    By Dmitry Gutsko, SAP Security ExpertWe know that SAP database systems are often overlooked when [...]

  • What the Quack: Hunt for the QBOT with Logpoint

    -Nilaa Maharjan Logpoint Global Services & Security ResearchExecutive Summary:QakBOT, also spelled Quakbot is an old [...]

  • Shifting Priorities: Why MSSPs need to act now to innovate and continue to evolve their offerings

    Matthew Rhodes, Regional Director, MSSP and Consulting PartnersManaged Security Service Providers (MSSPs) find themselves faced [...]

  • Detect, mitigate and respond to WDigest attacks with Logpoint

    by Nilaa Maharjan, Security ResearchInternal penetration testing often requires security specialists to attempt to extract [...]

  • Monitoring and assessing segregation of duties (SoD) conflicts in SAP systems

    by Sükrü ilkel Birakoglu, Senior Director Segregation of Duties (SoD) is an internal process which [...]

  • Securing your business-critical data with BCS for SAP

    By Ira Lisa Kristina Leino, Product Marketing Manager SAP systems are the center of business operations, [...]

  • More cyber security tools does not equal a stronger SOC

    Logpoint’s latest release helps analysts integrate their tech stack and combines many capabilities in a [...]

  • We found out what MSSPs really want. But why did we want to know?

    by Matthew Rhodes, Regional Director for MSSP & Consulting PartnersWhen I joined Logpoint back in [...]

  • Niels Onat: Experienced MSSP leader, joins Logpoint. Matt Rhodes, Regional Director for MSSP, caught up with him to ask – Why?

    From seasoned cybersecurity business leader to Regional Director of the Nordics and Baltics with Logpoint. [...]

  • Protecting Intellectual Property (IP) in SAP

    Always the bridesmaid and never the bride, SAP, in security terms, is the often-maligned function [...]

  • GDPR compliance through the protection of SAP systems

    The importance of SAP for compliance with the General Data Protection Regulation (GDPR).The implementation of [...]

  • The importance of SAP audits

    Why can a failed SAP audit put your business at risk, and how to ensure [...]