Our Blog
Home / Blog
Why Log4Shell could be the worst software vulnerability ever
Thousands of Java applications across the world are wide open to remote code execution attacks targeting the Log4j library. This post summarizes what we know so far about the Log4Shell vulnerability, how you can mitigate it, how to find it using Netsparker, and what...
Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability
Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability . The remaining days before Christmas will not be relaxing ones for IT and IT security managers in companies around the world: The Log4Shell...
S/4HANA and RISE: Top Takeaways From the 2021 UKISUG
S/4HANA and RISE: Top Takeaways From the 2021 UKISUG . By Sarah Rabett | December 15, 2021Snow Optimizer for SAPThought Leadership At the 2021 UKI SAP User Group, I joined a group of my Snow Software colleagues as we met face-to-face, spoke with other attendees about...
Implementation Considerations for Industry 4.0
Implementation Considerations for Industry 4.0 . in part one of our blog posts on planning for Industry 4.0, I looked at the importance for critical infrastructure providers of taking a phased approach to the challenge of securely connecting Operational...
Marketing and Advertising Companies: Data Security Best Practices
Marketing and Advertising Companies: Data Security Best Practices . Marketing and advertising companies need to tackle new customers needs and expectations while aligning their processes and practices to new privacy requirements and technical developments. In a...