Secude

Lucerne, Switzerland
1996
  |  By Secude
CMMC assessments began on 16 December. If you handle CUI, here’s 3 things you need to know for CMMC The CMMC final rule change is now live. On 16 December, certified third-party assessment organizations (C3PAOs) officially began assessing DoD contractors. Given the wide disparity between the number of assessment teams (~100) and members of the Defense Industrial Base looking for certification (~100,000), DoD contractors need to ensure they are assessment-ready asap.
  |  By Secude
With the final CMMC rule published, here’s a summary of everything you need to know for your CMMC Level and when. Another step closer. After more than seven years in the making, the US Department of Defense (DoD) finalized a rule establishing the Cybersecurity Maturity Model Certification (CMMC) program and outlining how it will work. The final program rule was published in the Federal Register on 15 October and will go into effect on 16 December.
  |  By Secude
From power grids and water systems to transport networks and healthcare facilities, critical infrastructure has become a key target for cyber attacks in recent years, such as US utilities suffering a 70% year-on-year increase in cyber attacks this year. The reason for targeting critical infrastructure is clear: they often use outdated software and the attacks have an outsized disruptive impact.
  |  By Secude
Nowadays, the digital supply chain is both essential and vulnerable. According to Pinsent Masons annual cyber report, supply chain breaches were the most common form of cyber incident in 2023 occuring in one third of cases (up from 5% in 2022). Meanwhile, Gartner predicts that almost half (45%) of global organizations will suffer a digital supply chain attack by 2025. Nowadays, the digital supply chain is both essential and vulnerable.
  |  By Secude
Zero Trust is no longer a nice-to-have - it’s a must-have. According to Cisco, over 86% of enterprise organizations have started rolling out a Zero Trust framework to protect their business-critical information and ensure regulatory compliance, but only 2% have successfully implemented a mature ZT architecture. Zero Trust is no longer a nice-to-have - it’s a must-have.
  |  By Secude
There’s no ‘good’ time for a data breach, but accidentally leaking sensitive information during closed periods leads to heavier financial and reputational costs than at other parts of the year. As SAP holds public companies' most sensitive financial and HR data, executives must guarantee the security of thousands of SAP downloads or face non-compliance fines and legal repercussions.
  |  By Secude
Zero Trust is no longer a nice-to-have - it’s a must-have. According to Cisco, over 86% of enterprise organizations have started rolling out a Zero Trust framework to protect their business-critical information and ensure regulatory compliance, but only 2% have successfully implemented a mature ZT architecture. Zero Trust is no longer a nice-to-have - it’s a must-have.
  |  By Secude
An Economist article published in June 2024 claimed that China is actively targeting US SMEs for long-term sabotage and for financial gain through sustained IP theft. With China using previously undetected methods of ‘cyber warfare’, it’s increasingly important that US companies adopt Zero Trust protection for their most valuable IP data.
  |  By Secude
As the curtains close for year 2023, the financial impact of cyberattacks on the global economy is predicted to reach $10.5 trillion. It is imperative for IT managers to be aware of the evolving landscape. Let’s see what will shape the cybersecurity arena in the coming year. From a data-centric perspective, we have identified 7 trends that will be important for data security.
  |  By Secude
The manufacturing industry has undergone a huge digital transformation in recent years. While these changes have increased productivity, the industry has also experienced new pressures from cybersecurity. In 2022, the industry has been vulnerable to 250 data violation incidents in the United States alone costing nearly 23.9 million USD. More and more industries are finding their intellectual property (IP) at risk as threat actors become more sophisticated.
  |  By Secude
In this interactive partner webinar, security experts from Boldon James and SECUDE talk about harnessing the power of data classification for your enterprise and SAP data in the most user-friendly and efficient way possible.
  |  By Secude
In this session, you will hear security experts from SECDUE talk about reducing a negative impact on user experience from traditional security solutions. You will also learn about emerging technologies that enable you to protect financial, PII, and other sensitive information inside and outside of SAP, while eliminating a negative productivity impact.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Auditing demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Classification demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore Data Loss Prevention demonstration in SAP.
  |  By Secude
SECUDE's Technical Product Manager walks you through a Halocore for Data Protection in HR demonstration in SAP.

SECUDE is an established global security solutions provider offering innovative data protection for SAP users. Its solutions are trusted by many Fortune 500 and DAX listed companies.

Leveraging its 20-plus years of experience in SAP security and business process know-how in protecting enterprise IP and data, SECUDE launched HALOCORE® as a holistic approach to protect SAP data exports.

In 2019, SECUDE launched HALOCAD® to protect invaluable IP in the form of CAD & PLM files in SAP and non-SAP environments.

HALOCAD® plugin for CAD/PLM is now available for AutoCAD, Autodesk Inventor, PTC Creo, Siemens NX, Solid Edge, SAP PLM, PTC Windchill, and Siemens Teamcenter.

SECUDE’s solutions are trusted by many Fortune 500 and DAX listed companies. With branches in Europe, North America and Asia, SECUDE supports customers with the implementation of IT security strategies through a global network.