Blog
Stay Informed
Receive our latest blogs directly in your inbox
SAP Role Redesign and S/4 HANA Transformation
One of the questions, which often comes up during SAP S/4 HANA…
Reflected XSS (CVE-2023-4189)
Cross Site Scripting (XSS) refers to when arbitrary JavaScript code could be…
Blind SQL Injection (CVE-2023-4188)
Structured Query Language (SQL) is a language used to interact with databases,…
Why VAPT is Essential for Your Organization’s Security
In today’s digital landscape, cybersecurity threats are becoming increasingly sophisticated.
My reflections on SailPoint Navigate events over the years
As a member of the identity security community, the significance of events…
SailPoint deployment with SAP GRC/ Access Control
SAP Access Control (also generally referred as SAP GRC or SAP GRC…
Onboarding SuccessFactors as an Authoritative Source
SuccessFactors (‘SF’) is one of the commonly used Human Capital Management (‘HCM’)…
Laying the foundation for a successful IAM program – setting the expectations!
Identity and Access Management (‘IAM’) is becoming an increasingly important part of…
The IAM trifecta
When we talk about IAM, it is mostly in the context of…
Clearing the confusion, let’s understand IAM
Before we get into understanding the IAM world, let’s first understand the…