Blog

Stay Informed

Receive our latest blogs directly in your inbox

    SAP Role Redesign and S/4 HANA Transformation

    One of the questions, which often comes up during SAP S/4 HANA…

    Reflected XSS (CVE-2023-4189)

    Cross Site Scripting (XSS) refers to when arbitrary JavaScript code could be…

    Blind SQL injection

    Blind SQL Injection (CVE-2023-4188)

    Structured Query Language (SQL) is a language used to interact with databases,…

    Why VAPT is Essential for Your Organization’s Security

    In today’s digital landscape, cybersecurity threats are becoming increasingly sophisticated.

    My reflections on SailPoint Navigate events over the years

    As a member of the identity security community, the significance of events…

    Simplify your SailPoint deployment with SAP GRC

    SailPoint deployment with SAP GRC/ Access Control

    SAP Access Control (also generally referred as SAP GRC or SAP GRC…

    Onboarding SuccessFactors as an Authoritative Source

    SuccessFactors (‘SF’) is one of the commonly used Human Capital Management (‘HCM’)…

    Setting Expectations for a Successful IAM Program

    Laying the foundation for a successful IAM program – setting the expectations!

    Identity and Access Management (‘IAM’) is becoming an increasingly important part of…

    The IAM trifecta

    The IAM trifecta

    When we talk about IAM, it is mostly in the context of…

    Understanding IAM Clearing the Confusion

    Clearing the confusion, let’s understand IAM

    Before we get into understanding the IAM world, let’s first understand the…