Avatar photo
By: Juan Herrera Utande

February 16, 2023 7:55 am

5,315 views

How to protect your SAP applications from Ransomware attacks

Introduction Why should I enable malware scanning in SAP applications? How does the SAP antivirus stack work? Installation and configuration Conclusion Introduction Ransomware is a well-known threat to your IT and business continuity that needs to be evaluated from many angles. We recommend you go through this series of blog posts from my colleague Raú[…]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 6:17 pm

5,143 views

Ransomware Attacks – Part 3, Container Security

Table of Contents 1. Introduction 2. How do we protect Kubernetes environments? 3. Why use Zero-Trust policies to stop the spread of malware? 4. The importance of having a secure software supply chain? 5. Why must we automate security in Kubernetes environments? 6. How can we scale these measures when we have multiple clusters? 7. […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

4,763 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 10:37 am

5,259 views

Ransomware Attacks – Part 1, Introduction

In this series of articles, I will talk about Ransomware attacks and how we can better protect our systems. What is ransomware? Ransomware is a type of malicious software (malware) that is designed to block access to a computer system or its data, usually by encrypting it, until a ransom is paid. It is typically […]

Read More