Practical pentesting of ERPs and business applications
Assessing and Securing SAP Solutions
A crushing blow at the heart of SAP’s J2EE Engine.
All your SAP passwords belong to us
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
If I want a perfect cyberweapon, I'll target ERP
Securing SAP in 5 steps
Attacking SAP Mobile
If I want a perfect cyberweapon, I'll target ERP - second edition
The latest changes to SAP cybersecurity landscape
13 real ways to destroy business by breaking company’s SAP applications
5 real ways to destroy business by breaking SAP applications
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comments
EAS-SEC Project
Implementing SAP security in 5 steps
SAP security landscape. How to protect(hack) your(their) big business
Practical SAP pentesting (B-Sides San Paulo)
Forgotten world - Corporate Business Application Systems
ERP Security. Myths, Problems, Solutions
Architecture vulnerabilities in SAP platforms