Secude

Lucerne, Switzerland
1996
  |  By Secude
Third-party incidents, critical infrastructure threats and regulatory fines for cyber attacks have all risen in 2024. Here’s how to avoid them in 2025. With over one billion records exposed and over $1 billion in regulatory fines issued, 2024 was a record-breaking year for data breaches - in more ways than one.
  |  By Secude
From external collaboration and compliance to key financial info and intellectual property, here are five areas that need Zero Trust as a priority. In mid 2024, Gartner research found that 63% of global organizations had fully or partially-implemented a Zero Trust strategy, but these strategies only covered a small portion of the organization’s environment and that many enterprises were still “not sure what the top practices are for Zero Trust implementations.”
  |  By Secude
CMMC assessments began on 16 December. If you handle CUI, here’s 3 things you need to know for CMMC The CMMC final rule change is now live. On 16 December, certified third-party assessment organizations (C3PAOs) officially began assessing DoD contractors. Given the wide disparity between the number of assessment teams (~100) and members of the Defense Industrial Base looking for certification (~100,000), DoD contractors need to ensure they are assessment-ready asap.
  |  By Secude
With the final CMMC rule published, here’s a summary of everything you need to know for your CMMC Level and when. Another step closer. After more than seven years in the making, the US Department of Defense (DoD) finalized a rule establishing the Cybersecurity Maturity Model Certification (CMMC) program and outlining how it will work. The final program rule was published in the Federal Register on 15 October and will go into effect on 16 December.
  |  By Secude
From power grids and water systems to transport networks and healthcare facilities, critical infrastructure has become a key target for cyber attacks in recent years, such as US utilities suffering a 70% year-on-year increase in cyber attacks this year. The reason for targeting critical infrastructure is clear: they often use outdated software and the attacks have an outsized disruptive impact.
  |  By Secude
Nowadays, the digital supply chain is both essential and vulnerable. According to Pinsent Masons annual cyber report, supply chain breaches were the most common form of cyber incident in 2023 occuring in one third of cases (up from 5% in 2022). Meanwhile, Gartner predicts that almost half (45%) of global organizations will suffer a digital supply chain attack by 2025. Nowadays, the digital supply chain is both essential and vulnerable.
  |  By Secude
Zero Trust is no longer a nice-to-have - it’s a must-have. According to Cisco, over 86% of enterprise organizations have started rolling out a Zero Trust framework to protect their business-critical information and ensure regulatory compliance, but only 2% have successfully implemented a mature ZT architecture. Zero Trust is no longer a nice-to-have - it’s a must-have.
  |  By Secude
There’s no ‘good’ time for a data breach, but accidentally leaking sensitive information during closed periods leads to heavier financial and reputational costs than at other parts of the year. As SAP holds public companies' most sensitive financial and HR data, executives must guarantee the security of thousands of SAP downloads or face non-compliance fines and legal repercussions.
  |  By Secude
Zero Trust is no longer a nice-to-have - it’s a must-have. According to Cisco, over 86% of enterprise organizations have started rolling out a Zero Trust framework to protect their business-critical information and ensure regulatory compliance, but only 2% have successfully implemented a mature ZT architecture. Zero Trust is no longer a nice-to-have - it’s a must-have.
  |  By Secude
An Economist article published in June 2024 claimed that China is actively targeting US SMEs for long-term sabotage and for financial gain through sustained IP theft. With China using previously undetected methods of ‘cyber warfare’, it’s increasingly important that US companies adopt Zero Trust protection for their most valuable IP data.
  |  By Secude
In this interactive partner webinar, security experts from Boldon James and SECUDE talk about harnessing the power of data classification for your enterprise and SAP data in the most user-friendly and efficient way possible.
  |  By Secude
In this session, you will hear security experts from SECDUE talk about reducing a negative impact on user experience from traditional security solutions. You will also learn about emerging technologies that enable you to protect financial, PII, and other sensitive information inside and outside of SAP, while eliminating a negative productivity impact.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Auditing demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Classification demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Data Loss Prevention demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore for Data Protection in HR demonstration in SAP.

SECUDE is an established global security solutions provider offering innovative data protection for SAP users. Its solutions are trusted by many Fortune 500 and DAX listed companies.

Leveraging its 20-plus years of experience in SAP security and business process know-how in protecting enterprise IP and data, SECUDE launched HALOCORE® as a holistic approach to protect SAP data exports.

In 2019, SECUDE launched HALOCAD® to protect invaluable IP in the form of CAD & PLM files in SAP and non-SAP environments.

HALOCAD® plugin for CAD/PLM is now available for AutoCAD, Autodesk Inventor, PTC Creo, Siemens NX, Solid Edge, SAP PLM, PTC Windchill, and Siemens Teamcenter.

SECUDE’s solutions are trusted by many Fortune 500 and DAX listed companies. With branches in Europe, North America and Asia, SECUDE supports customers with the implementation of IT security strategies through a global network.