Mfa Banner Img Single Home / Blogs / Overview These Resources Will Help You Navigate The Challenges Of ERP Threats Appsian Blog Center
Filter By Year:
July 29, 2021
Why You Should Avoid Customizing PeopleSoft to Enable Single Sign-On (SAML/ADFS)

Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft I was on a recent discovery call, and…...

Learn More
June 25, 2021
[Customer Story] Collin County, Texas, Uses Appsian’s MFA Solution to Improve PeopleSoft Data Security

Collin County, like all counties in Texas, is considered an extension of state government. Located just north of Dallas, Collin…...

Learn More
June 2, 2021
Solving Complex SAP Data Security Challenges with Dynamic Data Masking

Here are two use cases that might sound familiar…  While organizations spend millions combatting external threats, for example, hacking, phishing,…...

Learn More
May 17, 2021
Zero Trust is a Centerpiece of President Biden’s Latest Executive Order on Cybersecurity

On May 12th, President Biden signed an Executive Order to help improve the nation’s cybersecurity posture and strengthen Federal networks.…...

Learn More
May 12, 2021
[Podcast] Securing Access with PeopleSoft

Appsian’s Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of IAM Pulse, a podcast from BIO-key…...

Learn More
April 7, 2021
Are ERP Security and Compliance Risks Interfering with Your Digital Transformation?

Implementing enterprise resource planning (ERP) systems has always been both mission-critical and notoriously difficult. They must align with business processes,…...

Learn More
April 2, 2021
Advancing SAP Security and Risk Management with Least Privilege 2.0

The ERP security landscape is drastically evolving and traditionally on-premise applications such as SAP ECC and S/4HANA are falling behind.…...

Learn More
March 24, 2021
How Appsian Reduces Risk in SAP Procurement Transactions

The sheer breadth and complexity of the procurement process can make maintaining effective internal controls difficult. Organizations must implement business…...

Learn More
March 22, 2021
How Appsian Improves SAP Segregation of Duties Violations Management

From stopping fraud, theft, and errors to preventing SOX compliance violations, SAP Segregation of Duties (SoD) plays a lead role…...

Learn More
March 18, 2021
Implementing Dynamic SAP Data Masking in ECC & S/4HANA Using Appsian

2020 brought about a reckoning for organizations that were slow to adopt strong data privacy and data loss prevention strategies.…...

Learn More
March 11, 2021
It’s Time to Include Data in the ERP Security Conversation

ERP security had traditionally focused on vulnerability testing for ERP applications, whether hosted on-premise or in the cloud. Given the…...

Learn More
February 26, 2021
How Remote Work Has Accelerated ERP Data Privacy Challenges

If 2020 was the year of hastily enabling secure remote access to ERP applications, then 2021 will be the year…...

Learn More
February 2, 2021
[Podcast] Potential ERP Data Security and Compliance Risks for Legacy Applications

Appsian's Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of Brilliance Security Magazine Podcast. The focus of the conversation…...

Learn More
January 4, 2021
Modernize PeopleSoft Security with Defense in Depth

As work-from-home continues into 2021 indefinitely and the reality of this increased risk becomes clearer, organizations should heavily prioritize the…...

Learn More
December 9, 2020
5 Types of Insider Threats and How to Detect Them in Your ERP System

While the majority of data breaches are from insider threats—a startling 57% according to the Verizon Insider Threat Report—many organizations overlook these internal dangers. Whether careless or malicious, employee, partner,…...

Learn More
December 8, 2020
Securing Business Data in ERP Applications: A Fast Path Guide to Success

With 2020 coming to a close, ensuring business applications are equipped to meet the longterm access demands of 2021 is…...

Learn More
November 20, 2020
Why the California Privacy Rights Act (CPRA) Presents Challenges for Legacy ERP Customers

While nearly everyone was focusing on the results of the 2020 Presidential race, California voters passed Proposition 24, the California…...

Learn More
November 16, 2020
How to Detect Insider Threats in Your ERP System

Insider Threats Are Becoming More Frequent and More Costly to Organizations. Especially Those Using Legacy ERP Systems. Here's How You…...

Learn More
November 4, 2020
How IT Can Use ERP Data to Become a Hero to their Business Stakeholders

When business stakeholders come to you looking for answers, having visibility and context around ERP data access and usage gives…...

Learn More
October 29, 2020
Are Advanced Persistent Threats (APT) Haunting Your ERP Applications?

Halloween 2020 (the day, not another movie) is right around the corner. Usually, I'm thinking about spirits and haunted houses…...

Learn More
October 27, 2020
Data Breaches Are Going Up, While Cybersecurity Training is… Going Down?

According to a recent Shred-It survey, both senior leaders and employees indicated data breaches doubling in frequency in the last…...

Learn More
October 20, 2020
SAP Access Control: A Beginner’s Guide to SAP Dynamic Authorization

As your company’s digital footprint grows, you can enhance your security posture by complementing your existing SAP Role-Based Access Controls…...

Learn More
August 20, 2020
How Does Appsian Work with SAP GRC Access Control?

At the SAPinsider 2020 virtual conference experience, one of our product demo attendees asked how Appsian works with SAP GRC Access Control. We get this question a…...

Learn More
August 11, 2020
Monitoring High Privileged User Activity in PeopleSoft and SAP Using Appsian360

We are in the midst of a perfect storm of ERP security calamity: the greatest work from home experiment colliding with historic…...

Learn More
August 6, 2020
Protecting ERP Data from Application Vulnerabilities Using A Multi-Layered Security Approach

You spend countless hours, not to mention considerable money, to secure your SAP and Oracle ERP data. One day, you discover that cybercriminals…...

Learn More
August 4, 2020
Why Colleges and Universities are Rushing to Implement Single Sign-On for PeopleSoft

It’s not uncommon for higher education institutions to approach us (with great haste) about our Single Sign-On (SSO) solution for PeopleSoft Campus Solutions. Lately, I’ve noticed…...

Learn More
July 28, 2020
When it Comes to ERP Data Security, Context (of Access) Matters – Appsian360 Can Help!

Organizations using traditional, on-premise ERP applications like SAP ECC and Oracle PeopleSoft are facing a rapidly changing reality around the…...

Learn More
July 21, 2020
The RECON Bug Highlights SAP Customers’ Need for Fine-Grained Control and Visibility (Not Just Security Patches)

A critical SAP vulnerability (CVE-2020-6287 or RECON) was recently discovered by Onapsis that gives attackers TOTAL control of vulnerable business applications. It…...

Learn More
July 16, 2020
SAP RECON Vulnerability Puts Thousands of ERP Customers at Critical Risk

A critical SAP vulnerability (CVE-2020-6287 or RECON) was recently discovered by Onapsis that gives attackers TOTAL control of vulnerable business…...

Learn More
June 25, 2020
Appsian Releases Report Revealing Executive Perspective on SAP Business Risks and Controls

Every organization using SAP ERP applications faces the unique challenge of maintaining a strong security posture while enabling productive business processes. Throw in the uncertainty of today’s rapidly changing environment, and you…...

Learn More
June 24, 2020
CCPA Enforcement Is on Track to Start July 1, 2020. Are Your Data Privacy Strategies Ready?

Time is almost up for companies scrambling to get their data privacy strategies in compliance with the California Consumer Protection Act (CCPA). Beginning as…...

Learn More
June 23, 2020
Australia Under Cyberattack – How to Quickly Implement “Zero Trust Security” in PeopleSoft

Just a few days ago, the Australian Prime Minister, Scott Morrison announced that Australia is being continuously targeted by sophisticated,…...

Learn More
June 16, 2020
Improve SAP Access Policy Management During These Turbulent Times – and Beyond

In these less than ordinary times, organizations are dealing with disruption at a frequency higher than ever before. An unfortunate side-effect…...

Learn More
June 1, 2020
Your Network Access Could Be for Sale on the Dark Web. Why ABAC is Critical for ERP Data when Your Network is Vulnerable

Thanks to TV commercials for identity protection services, you're forgiven for thinking that that dark web is primarily a place where criminals…...

Learn More
May 26, 2020
Does ERP Data Security Qualify as an Essential IT Project? Here Are Five Reasons Why It Does.

Stop me if you've heard (or spoken) this phrase: "All non-essential projects have been put on hold." To be fair,…...

Learn More
May 18, 2020
Access Governance is Critical for Preventing Phishing Attacks

The news is flooded with stories about cybercriminals successfully engaging in phishing and social engineering aimed at exploiting people’s COVID-19…...

Learn More
May 15, 2020
Why the Keys to Maintaining ERP Data Security in a Remote Environment are Control and Visibility

Remote workforces are nothing new to most organizations. According to Buffer’s 2019 State of Remote Work report, 44% of respondents…...

Learn More
May 14, 2020
Managing Compliance Costs with Enhanced Cybersecurity Visibility

Data privacy regulations are rapidly reshaping the way companies monitor, manage, and even define the data they collect and store.…...

Learn More
May 13, 2020
The Implications of Remote (Higher Education) Learning… Now that CSU Announced Campuses are 100% Remote in the Fall

California State University, the largest four-year public university system in the country, made headlines when it announced Tuesday that it intends to…...

Learn More
May 12, 2020
ERP User Activity Monitoring: Here are the (5) Most Important Details to Capture

Analytics have always been necessary for informing ERP data security policies. This has never been more relevant than today, in this…...

Learn More
May 7, 2020
Happy World Password Day! Celebrate By Adopting Passwordless Authentication (for PeopleSoft)

Every first Thursday in May, cybersecurity professionals collectively roll their eyes at the idea that there is (in fact), a…...

Learn More
May 6, 2020
Oracle Extends PeopleSoft Support to 2031. Now’s the Time to Invest in PeopleSoft Data Security Projects

On April 19, 2020, Oracle announced on its PeopleSoft Support blog that the company is extending support for the ERP application…...

Learn More
April 29, 2020
How to Streamline the SAP Segregation of Duties Exception Process Using Attribute-Based Access Controls

Secure, compliant, and efficient business processes are critical to enterprise operations. In SAP, Segregation of Duties (SoD) is a key…...

Learn More
April 22, 2020
Why VPN is Not Enough – and why Investing in ERP Data Security is Critical

With remote workplaces being put to the test, organizations are looking to quickly scale their security practices. Unfortunately, many are…...

Learn More
April 17, 2020
User Behavior Analytics are Critical in Remote ERP Environments. Here’s Why…

I was recently speaking with a customer who expressed a common concern. Because of COVID-19, their entire finance team was…...

Learn More
April 7, 2020
Looking for a PeopleSoft ‘Quick Win’? Integrate SAML for Single Sign-On (SSO)

It’s no secret that managing PeopleSoft passwords can be challenging. This has been a hot topic for years – and…...

Learn More
April 2, 2020
Is a VPN Enough to Maintain ERP Data Security?

With the influx of remote access demands, VPN vendors are no doubt having their moment. This is 100% warranted, but…...

Learn More
March 30, 2020
Protecting Remote Users From the Latest Barrage of Social Engineering Attacks

The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious…...

Learn More
March 24, 2020
Remote Access: You Can’t Fight the Trend

In September of 2001, I was conducting a comprehensive security audit of a major health care insurer. They were dealing…...

Learn More
March 18, 2020
Remote Access to PeopleSoft a Requirement? Here’s (3) Success Stories to Consider

With the workforce disruption caused by Coronavirus (COVID-19),enabling remote access to ERP applications like Oracle PeopleSoft has become a business…...

Learn More
March 16, 2020
Maintaining Business Continuity During Coronavirus (COVID-19): Securing Critical ERP Functions For Remote Access

As organizations prepare to protect their workforce from Coronavirus (COVID-19), they need to balance best health practices with best security…...

Learn More
March 11, 2020
Five Tips for Enabling Secure Mobile Access to PeopleSoft

Enabling mobile access to PeopleSoft is a primary objective for many organizations. Naturally, there are security concerns when making transactions…...

Learn More
March 9, 2020
Responding to Coronavirus (COVID-19): How to Enable PeopleSoft for Secure Telecommuting

With companies like Microsoft, Amazon, and Twitter encouraging workers to stay home, many wonder if this is the beginning of…...

Learn More
December 19, 2019
2020’s Top ERP Security Challenges: It’s All About the Data!

As we enter the new year, the criticality of securing sensitive data will continue to mold and transform the structure…...

Learn More
November 14, 2019
Why Adaptive Multi-Factor Authentication (MFA) is the Key to Strict ERP Security – Without Causing User Friction

Cats & dogs, oil & water… Apparently, these groups don’t get along. You can definitely add Security Admins & Business…...

Learn More
October 15, 2019
64% of SAP & Oracle ERP Customers have reported a Breach (in last 24 months)

The numbers are out, and it's more apparent than ever - your ERP system is most likely at risk. A…...

Learn More
October 11, 2019
Why Contextual Access Controls are Essential for On-Premise ERP Applications

Gartner describes context-aware security as the use of supplemental information to improve security decisions at the time they are made. "Context" meaning…...

Learn More
September 26, 2019
Zero Trust Security: What it is and Where to Begin

Zero Trust security is based on the principle of ‘never trust, always verify’. First introduced by Forrester Research, a Zero…...

Learn More
August 8, 2019
BYOD & Allowing Mobile ERP Access: Evaluating Potential Risks

Organizations are rapidly shifting to workplaces without boundaries - teams are globally dispersed and companies are adopting work-from-home and BYOD…...

Learn More
August 5, 2019
Data Security Penalties Get Real….Real Expensive

How companies approach data security controls is changing. Segregation of Access (SoAx) is now just as critical as Segregation of…...

Learn More
June 20, 2019
Data Security: What Steps Can You Take?

We’ve talked extensively about Segregation of Access (SoAx) and how data security threats have evolved to include a range of…...

Learn More
April 19, 2019
Sensitive Data Security: It’s All About the Logging

Well, in today’s post it is all about the logging.  In a future post it will be all about the…...

Learn More
April 12, 2019
ERP Data Security Assessments: Then and Now

This is a long one and gets techie in areas, but bear with me.  There’s a moral to the story.…...

Learn More
March 18, 2019
How Establishing Strong Segregation of Access Policies are the Keys to Protecting your ERP Applications from Access via the Wild West (aka the internet)

In the years I’ve been architecting and assessing organizational information security approaches; the typical focus of any effort was on…...

Learn More
March 7, 2019
Making Sense of MFA, SSO and Other Session Baby Sitters

I was at the Alliance conference in Orlando this past week, and in the course of presenting and listening to…...

Learn More
February 25, 2019
Privacy Versus Security in a Connected World

There’s an interesting story from a few years ago.  An angry father marched into the corporate office of Target and…...

Learn More
February 18, 2019
Data Privacy and the Evolution of Segregation of Duties

In my years of performing organizational security assessments, application level vulnerability testing usually included an evaluation of the application’s ability…...

Learn More
February 5, 2019
CISO Survival 103: The Importance of Classifying Sensitive ERP Data

This will be the final entry in our current CISO Survival series.  And we’re taking a step back.  We’ve talked…...

Learn More
February 1, 2019
CISO Survival Part 2: The Perils of Managing Sensitive Data

In our previous post, we talked about the role of the CISO and how the rapidly evolving, connected economy is…...

Learn More
January 30, 2019
CISO Survival: Are You Protecting Your Sensitive Data?

Do You Even Know What and Where It Is? Not too long ago, I was involved in the war room…...

Learn More
January 22, 2019
According to the OWASP, ERP Is Vulnerable

Representatives of the Open Web Application Security Project (OWASP) periodically release a top 10 list of known vulnerabilities that impact…...

Learn More
January 10, 2019
Locking the Front Door Isn’t Always Enough

Most of us are now familiar with what Multi Factor Authentication (MFA) has brought to our daily lives.  Try accessing…...

Learn More
January 2, 2019
2019: ERP In the Crosshairs

There’s an old Hollywood saying that showcases the cinematic battle between the well-armed and the ill-prepared: “Never bring a knife…...

Learn More
December 5, 2018
ERP Breaches Increasingly Becoming User-Centric

According to a report from the Information Commissioner (ICO), data breaches are up 75% in two years. Research from the…...

Learn More
December 3, 2018
The Marriott Breach: Do You Have Unwanted Guests In Your ERP System?

Marriott has reported that a massive data breach of its guest reservation system has led to the exposure of over…...

Learn More
November 28, 2018
December is Prime “ERP Data Breach” Season… Be Prepared!

Establishing security best practices for your PeopleSoft applications is always a work in progress. As newer, more advanced threats come…...

Learn More
November 8, 2018
ERP Data Breaches: The Penalties Are Real… Real Expensive

The 2015 Anthem Medical Data Breach In August of this year, the United States approved the final judgement against the…...

Learn More
November 2, 2018
Social Engineering: Defending the Weakest Link

In today’s information security environment, great technological strides have been made in the areas of network protection, data encryption, intrusion…...

Learn More
October 26, 2018
Social Engineering Attacks:  Exploiting the “Human Element”

In the digital security world, social engineering is defined as the act of tricking someone into doing something that is…...

Learn More
October 24, 2018
Appsian Customer, Hackensack Meridian Health, Honored as PeopleSoft Innovator at Oracle OpenWorld

This week, Hackensack Meridian Health (HMH), a New Jersey-based not-for-profit health care organization (and Appsian customer) was identified as a PeopleSoft Innovator for…...

Learn More
July 23, 2018
California Raisin’ the Bar on Data Privacy

June was an interesting legislative month in the state of California.  In the face of an impending ballot initiative that…...

Learn More
June 25, 2018
PeopleSoft and GDPR: Accelerate Breach Detection and Remediation

The European Union's General Data Protection Regulation (GDPR) came into effect on May 25th, 2018 and made a far-spreading impact…...

Learn More
February 5, 2018
Now Introducing PeopleSoft Security Analytics (Preview Available)

GreyHeller is proud to announce the arrival of PeopleSoft Security Analytics   Next-generation software providing actionable insights into how your…...

Learn More
October 1, 2017
October is National Cyber Security Awareness Month… and it couldn’t have come sooner!

In honor of October being National Cyber Security Awareness Month, we ask you to consider this scenario: How Cyber-Criminals are Stealing…...

Learn More
September 6, 2017
Adopting Cloud: Fact or Myth – “Hybrid as a Best Practice”

Stop me if you’ve heard this one... “Do you want to get the most from your ERP? Then you must…...

Learn More
August 11, 2017
University of Waterloo relaunches direct deposit self-service functionality for employees

Direct deposit is a given for most of us. Until it doesn't work. I definitely remember the days of getting…...

Learn More
August 6, 2017
Why the 2017 Anthem Healthcare breach matters to PeopleSoft customers

A GreyHeller customer – one of the largest financial services firms in the US – licensed and implemented our ERP…...

Learn More
June 7, 2017
SAML and PeopleSoft Security – Why you should care

SAML. ADFS. Shibboleth. Your network team may be bringing up these terms as they relate to your organization’s security initiatives…...

Learn More
February 15, 2017
Heartbleed, Ticketbleed… When Network Infrastructure Security Lets us Down

When securing enterprise systems every PeopleSoft customer knows they need strong passwords and secure networks. A good firewall is a…...

Learn More
September 15, 2016
Fall Webinar Series: UX; Security; Tips & Techniques

Please join us for our Fall Webinar Series. UX Webinars Make The Most of Campus Solutions 9.2 and Fluid Wednesday,…...

Learn More
February 24, 2016
Fluid webinar series: Adopting Fluid? Make It Secure

This Webinar details how PeopleSoft customers can securely push Fluid HCM Self-Service transactions outside the corporate network....

Learn More
February 23, 2016
Webinar Recording: UNC Chapel Hill Thwarts Cybercrime with ERP Firewall

This webinar is from last year but the topic and information is still very relevant, perhaps even more relevant considering…...

Learn More
November 11, 2015
Oracle’s CVE-2015-4852 Update

Since many PeopleSoft customers utilize weblogic for their PeopleSoft environment, we wanted to highlight yesterday’s security alert. Oracle released an…...

Learn More
November 6, 2015
PS_TOKEN becoming standard PeopleSoft Penetration Test

After the PS_TOKEN threat vector was announced at Hack in the Box Amsterdam in May 2015, security organizations started adding…...

Learn More
October 15, 2015
Automation of Identity Management Ensures Data Security

Security professionals are generally most concerned with outside hackers, malicious insiders and accidental data loss.  However, if they don’t focus…...

Learn More
September 22, 2015
Why you should take a layered approach to securing PeopleSoft access

A layered approach is critical to protect your PeopleSoft system against multiple threat vectors. Deploying a series of security barriers…...

Learn More
September 4, 2015
What you need to know about the reported PS_Token vulnerability

Appsian has been offering security assessments to both customers and non-customers around the potential of a PS_TOKEN configuration vulnerability. Over…...

Learn More
August 25, 2015
Tracking high-privileged users requires a strict security policy

While some organizations believe hacks come from only external sources, these companies may be missing an even larger threat: internal,…...

Learn More
August 14, 2015
What you should know about PeopleSoft and Common Web Application Vulnerabilities

Background In recent blog posts, we’ve mentioned that PeopleSoft provides a number of security protections out of the box. In…...

Learn More
August 2, 2015
Webinar: Fact or Myth – Protecting your PeopleSoft HCM Data from Cybercrime

Want to sort cybercrime fact from fiction? Do you think you know the difference? Test your knowledge. In this OHUG sponsored…...

Learn More
July 7, 2015
PS_Token Update and Department of Homeland Security July 1 Report

As a follow-up to our June 3rd post PS_TOKEN vulnerability and prevention, I wanted to share recent activity about which…...

Learn More
June 3, 2015
What you should know about PS_TOKEN vulnerabilities and how to prevent them

If you weren’t in Amsterdam last week,  you missed out on a session at the Hack in the Box conference…...

Learn More
April 9, 2015
GreyHeller Security & Mobile Webinar Series

4/22 Protecting PeopleSoft for Self Service Time: 11am PST / 2pm EST Description: Your employees are demanding better access to their pay,…...

Learn More
April 7, 2015
The Big Disconnect

Is is ignorance? The ostrich strategy? Breach fatigue? Whatever, the data are mind-boggling. In a recent Raytheon-Ponemon survey of 1006…...

Learn More
March 31, 2015
GreyHeller at Collaborate15- Las Vegas

GreyHeller is thrilled to showcase our Mobile and Security solutions at Collaborate 2015. From announcing new partnerships, to launching your institution’s mobile…...

Learn More
March 11, 2015
GreyHeller Sessions and Customer Sessions @ Alliance2015

GreyHeller is thrilled to showcase our Mobile and Security solutions and our customers’ sessions at Alliance 2015.  From announcing new partnerships, to launching…...

Learn More
February 17, 2015
Executive Order 13636 promotes industry collaboration on cybercrime

Now we're getting somewhere... Obama recently signed Executive Order 13636 to much fanfare at Stanford University. Of particular interest to…...

Learn More
February 3, 2015
Top security breaches of 2014

Check out this chart for the top breaches... Date (2014) Company Number of records exposed Types of records 25 Jan…...

Learn More
January 29, 2015
Shelley Nelson Joins GreyHeller as Vice President of Services

Shelley Nelson,Vice President of Services San Ramon, California – January 28, 2015 – GreyHeller, LLC, provider of the leading security…...

Learn More
January 7, 2015

The Sony breach – and virally every other recent high profile breach – has finally driven home what GreyHeller has…...

Learn More
January 6, 2015
Cybersecurity Tipping Point? Absolutely.

We've been talking about this tipping point for some time now. Supporting our view... The Cybersecurity Tipping Point - from TechCrunch Assume…...

Learn More
January 6, 2015
GreyHeller January Security Webinar Series

January 5, 2015 - San Ramon, CA – GreyHeller today announced an Insider Threat Security Webinar Series focused on helping…...

Learn More
December 22, 2014
The Upside to Breach Fatigue

Smart consumers - pounded by the relentless onslaught of breaches affecting them directly (my household had new credit cards issued…...

Learn More
December 18, 2014
Breach fatigue

I heard a term yesterday that frightened me - Breach Fatigue (being in the Security business can make one paranoid).…...

Learn More
December 18, 2014
OHUG Interview With GreyHeller CEO Hendrix H. Bodden

The year has been full of cyber attacks that have left sensitive information ranging from bank accounts to social security…...

Learn More
December 17, 2014
Scary UK cybercrime data

Companies, higher education institutions, healthcare organizations are not only fighting organized cybercrime rings (makes the Mafia look like a cottage…...

Learn More
December 13, 2014
Sony Knew About Security Vulnerability Before Breach

Really? This has us scratching our heads....no editorializing necessary. An audit by PriceWaterhouseCoopers over the summer warned Sony - “Security incidents…...

Learn More
December 9, 2014
How Data Masking Helps Prevent Cyber Attacks

Data Masking could have helped prevent recent, high-profile destructive cyber attacks. How? By scrambling or removing sensitive data from production…...

Learn More
December 6, 2014
Allocation of risk in a data breach

We're getting closer to a tipping point where organizations are going to have to prove conclusively to their customers, lenders,…...

Learn More
December 4, 2014
Fluid UI– How to Deploy Safely & Securely– Webinar Recording

GreyHeller's Executive Director of Security Solutions, Greg Wendt, leads a demo-intensive session showing how organizations can deploy fluid transactions safely…...

Learn More
November 24, 2014
GreyHeller Presents A Two-Part Webinar

  2-Part Webinar Series Fluid UI – An Early Look Join Larry Grey, GreyHeller's President, and Chris Heller, CIO at GreyHeller, for an early look at…...

Learn More
November 18, 2014
Cyber Criminals Targeting University Payroll Systems

August 26, 2014 - San Ramon, CA – According to a recent advisory issued by Research and Education Networking Information…...

Learn More
September 17, 2014
Secure Yourself Today for Tomorrow!

Ethical Hackers at Rhino Security Labs released information about serious security holes within Oracle applications this week. Millions of records…...

Learn More
August 18, 2014
GreyHeller Presents a FREE Webinar Series

Join us for a series of informative webinars hosted by Larry Grey, President, Chris Heller, Chief Technology Officer and Greg Wendt,…...

Learn More
August 8, 2014
Phishing attacks increase

June phishing attacks accounted for over $400 million in global losses. 57% of global phishing attacks are targeted at the…...

Learn More
August 8, 2014
Change your passwords

A Russian crime ring has collected over 1.2 billion user names and passwords. The statistics within this breach are stunning.…...

Learn More
July 31, 2014
Protect Against Mistakes

Homeland Security issued a new report warning about hackers attacking remote access software. Checking in from home leaves entry for…...

Learn More
July 23, 2014
Top 10 Data Breaches of the Past Five Years (Infographic)

Top 10 Data Breaches of the Past Five Years (Infographic) By TSC Advantage, Holistic Security Consultancy...

Learn More
July 21, 2014
Don’t be reactive when it comes to securing your PeopleSoft assets from cybercime. Be proactive.

Kevin R. Brock, a leading cybersecurity expert and the FBI’s former Principal Deputy Director, National Counterterrorism Center and Assistant Director…...

Learn More
July 17, 2014
GreyHeller Appoints New Executive Director of Security Solutions

Organizations seek protection of their Oracle PeopleSoft applications from cybercrime San Ramon, California – July 15, 2014 Today, GreyHeller announced…...

Learn More
July 3, 2014
Click to Call for Two-Factor Authentication

Recently, one of our Higher Education customers - a highly regarded US university - implemented another option for Two-Factor Authentication…...

Learn More
July 2, 2014
How much does it cost to avoid a breach?

If organizations won't spend what's necessary to license technology that protects their sensitive data because of cost considerations,we believe class…...

Learn More
June 27, 2014
Lessons from the Code Spaces DDoS

Last week the website Code Spaces was attacked by a distributed denial of service attack (DDoS). This is a pretty…...

Learn More
June 24, 2014
Another day another phishing attack

A single compromised website hosted 862 PHP scripts. Think about that for a minute – 1 server, with 862 scripts.…...

Learn More
May 21, 2014
$20 million in data breach costs vs. Licensing ERP Firewall……do the math

Costs associated with the Maricopa County Community College District (MCCCD) data breach that occurred in April 2013 continue to rise…...

Learn More
June 17, 2013
How to Prevent Student Grade Hacking in PeopleSoft

Larry just posted a YouTube video that describes how our ERP Firewall product's 2-Factor Authentication feature can help prevent students…...

Learn More
May 26, 2011
Chicago Office Opens

Chicago office opens Well, we just couldn't stay put in the San Francisco East Bay. Based on 2010 growth, and…...

Learn More
September 20, 2010
Advanced PeopleSoft Security Audit – OpenWorld 2010

David Pigman of SpearMC consulting presented Advanced PeopleSoft Security Audit. Most of the presentation consisted of walking through slides of…...

Learn More
July 24, 2009
Increasing System Availability with PeopleSoft

System Availability. This is a very important topic, that has received a lot of attention, especially in the area of…...

Learn More
July 8, 2009
Using PeopleSoft Performance Monitor

I had a question the other day about getting going with PeopleSoft Performance Monitor so I thought I'd post a…...

Learn More
June 28, 2009
Security Issues With PeopleSoft Production Refreshes

I helped some folks the other day with an issue that had the potential to be very serious for them;…...

Learn More
April 26, 2009
Issues with Dynamic Roles in PeopleSoft

We wrote awhile back about a customization that can be done to limit a user's roles dynamically at a signon…...

Learn More
July 7, 2008
PeopleSoft telephony two factor authentication

(update : check out demo 4 in the Flash demo for our ERP Firewall to see some additional real world…...

Learn More
April 11, 2008
Firewall Product as Savior

We had an interesting situation with one of our customers recently where creative use of one of our products, the…...

Learn More
April 9, 2008
Reporting against multiple Setids in PeopleSoft

This is another of those posts that I had intended to get completed a while ago, but ended up getting…...

Learn More
September 26, 2007
Security Zone Management in Internet Explorer

Internet Explorer manages a whole host of security settings through the concept of security zones. Security zones have names such…...

Learn More
March 20, 2007
Alliance 2007 Session Evaluations

In the past couple of days, we’ve received lots and lots of emails from folks who attended our sessions at…...

Learn More
October 27, 2006
Oracle Open World 2006 Wrap-Up

We survived Oracle OpenWorld 2006. A very long, but rewarding week. We originally planned to to blog the show as…...

Learn More
May 18, 2006
Little known Row Level Security hook

In my previous posting on passing parameters to nVision, I briefly mentioned something that was unknown to one of the…...

Learn More
April 27, 2006
PeopleSoft Single Signon

(Sept. 20 update: since writing this we have created a Desktop Single Signon snap-on product that works with PeopleSoft Enterprise.…...

Learn More
January 19, 2006
Dynamic PeopleSoft Security Based on Login

(update : see ERP Firewall for PeopleSoft) A few years back I had the opportunity to help out with an…...

Learn More
December 27, 2005
Materialized Views and Row Level Security

While consulting at the same customer in NYC, we were looking at performance issues related to implementing row level security.…...

Learn More
November 1, 2005
October Update

Our apologies to our loyal blog readers for the lack of content in the past few weeks. Grey Sparling Solutions…...

Learn More
October 16, 2005
Why You Should Avoid PeopleCode For Row Level Security

In the previous post about row level security, I mentioned that the two PeopleCode events SearchInit and SearchSave were not…...

Learn More
October 14, 2005
Understanding Row Level Security

One of the things that is often misunderstood about PeopleSoft applications is how row level security works. Part of the…...

Learn More
September 29, 2005
Hierarchical Reporting in nVision

There was another set of requirements that were important to the customer in my conference call yesterday. That was hierarchical…...

Learn More
July 25, 2005
NorCalPRUG Meeting Notes — Technical Roundtable Notes

The last large session of the day was the Technical Roundtable. Chris Heller and Larry Grey of Grey Sparling were…...

Learn More

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands