What is so cross-site about Cross Site Request Forgery? What kinds of forgery can be committed using XSRF?
Continue reading “Cross Site Request Forgery – Explained in detail”
At what level should ERM be integrated with business processes – this is a dilemma that many organizations face when implementing an ERM.
Continue reading “Enterprise Risk Management – Benefits”
A new tool from security vendor Onapsis aims to secure SAP’s in-memory database HANA, the German company’s fastest-growing data processing product.
Onapsis, a Boston-based company that specializes in SAP security, will incorporate the tool into its X1 suite, which scans for vulnerabilities and configuration problems in SAP deployments.
HANA is a cornerstone of SAP’s strategy to compete with Oracle and IBM. Available as a cloud service and an appliance, it’s designed to process analytical and transaction workloads much faster for SAP’s ERP, CRM, supply chain and business intelligence applications.
Read More at Network World
What the Information Security manager should aim for
Continue reading “Security Resolutions for 2010”