Here's the recent articles submitted by abdul saleem
Articles By abdul saleem
Sap Field Level Security Augmenting Roles With Attributes
Submitted as: appsian
Businesses that use ERP systems are already leveraging role-based access controls (RBAC). These controls match data access rights with job function resources and provide a data governance system. But companies need to build more comprehensive and dynamic access controls policy for a large remote workforce.(read
entire article)
View : 170 Times
Category : Service
Why Sap Customers Need Fine Grained Visibility And Control
Submitted as: appsian
Onapsis recently discovered a critical vulnerability of the SAP (CVE-2020-6287 or RECON), which gives attackers complete control over vulnerable business applications. It enables hackers to gain unauthenticated access to SAP, and then create new user accounts with privileges of admin (superuser). A malicious hacker can inflict massive damages with these privileges, including stealing data, changing bank account numbers, altogether sabotaging systems, etc.(read
entire article)
View : 178 Times
Category : Service
Why Employers Are Still Looking For Peoplesoft Skills
Submitted as: appsian
PeopleSoft is a massive, monolithic system that was launched way back in 1988. Though competing with the faster and cheaper cloud and SaaS solutions, PeopleSoft applications are being used by organizations worldwide even now(read
entire article)
View : 172 Times
Category : Service
Access Governance Is Critical For Preventing Phishing Attacks
Submitted as: appsian
There has been quite an upsurge in instances of phishing attacks during the past few months. Cybercriminals, exploiting people's COVID-19 fears, are engaging in phishing and social engineering aimed at stealing user credentials to business applications and VPNs.(read
entire article)
View : 196 Times
Category : Service
Establish Enterprise Governance Risk And Compliance In Peoplesoft
Submitted as: appsian
As data regulations broaden in scope and cyber threats become sophisticated, companies need to update their security posture to monitor risk factors and comply with new regulations. Risk management and compliance management are two vital components of the security posture of a company. If not well-established, they may lead to catastrophic data breaches, huge fines, legal consequences, etc. Although cybercrime and data breaches are at an all-time high, new rules on data protection have implemented strict guidelines for collecting and using sensitive data.(read
entire article)
View : 176 Times
Category : Service