Blog

Take a break and read all about it

Mitigating Active Cyberattacks on SAP bugs in realtime | Extreme Compute

Sensitive vulnerabilities in unpatched SAP software are being widely exploited by cyberattackers around the world, according to researchers. On Tuesday, a study was published on the activities, which include the weaponization of security vulnerabilities with CVSS severity scores of up

Choosing a HANA Cloud Provider shouldn’t be hard – EC Cloud

When choosing a HANA cloud provider, it is important to ensure that key business leaders understand what SAP HANA is — and, more importantly, how HANA permeates the current SAP application software and server environment. HANA is SAP’s in-memory repository