We recruit and hire SAP talent from the CIO level to team members in virtually every type of SAP/ERP skill set. We will shrink your recruiting cycle and ensure you have premium access to the non-active talent pool. Request a FREE Consultation.
…
continue reading
In this podcast series, YASH SAP WM/EWM expert Jason Kite would help us explore the various technology enablers such as RFID, barcoding, etc. that are optimizing and streamlining warehouse operations, processes, and systems - right from strategy to execution.
…
continue reading
The SAP Business Technology Platform Podcast
…
continue reading
With over 18 years of experience in IT consulting specializing in SAP (ERP), Srikanth brings a proven track record in managing complex projects, nurturing strong client relationships, and handling multi-regional projects. As an SAP and PMP-certified executive, he has experience delivering enterprise solutions and providing project executive coverage, project management, and functional architecture across SAP sales and implementation engagements.
…
continue reading
The CEO of the largest single investor in the world, Norges Bank Investment Management, interviews leaders of some of the largest companies in the world. You will get to know the leader, their strategy, leadership principles, and much more. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Better Together: Customer Conversations – a series where customers, partners, and thought leaders discuss solving business challenges with SAP Business Technology Platform. Hear from your peers and join in the inspiring conversations.
…
continue reading
Let’s cut the BS out of CS. Discover the best practices of some of the most influential leaders in customer success and learn to develop your own winning strategy with actionable takeaways. We’ll share insights, tips, and success stories to help you build your CS practice to drive significant business value and growth. Learn exactly what it takes to deliver a world-class customer experience and become a high-impact customer success leader. Join us for CS No BS, hosted by Totango President & ...
…
continue reading
The Unexplored Territory Podcast is a bi-weekly show focussing on datacenter and cloud related topics, with a heavy emphasis on VMware/Broadcom products and the VMware ecosystem. The show is hosted by Duncan Epping (author of Yellow-Bricks.com, and the vSphere Clustering and vSAN Deep Dive book series), and each episode will feature an industry-leading expert to dive deep into their area of expertise.
…
continue reading
Talking with the people who own the largest and most complex CRM systems, with a strong focus on Salesforce. https://www.crmsuccess.show/ Your Host on LinkedIn: Maz: https://www.linkedin.com/in/davidmasri/ Khero: https://www.linkedin.com/in/kherothetxrecruiter/
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Success League presents a lineup of customer success interviews, book reviews and conversations with authors, and features hosts Kristen Hayer and Russell Bourne.
…
continue reading
The CPQ Podcast is your go-to source for all things Configure-Price-Quote (CPQ). Each episode features in-depth interviews with industry leaders, innovators, and practitioners who share real-world insights, strategies, and success stories. Whether you're in Sales Ops, RevOps, IT, or Product Management, this podcast helps you stay ahead in the evolving CPQ landscape — from CPQ tools and processes to digital selling, product configuration, pricing strategy, and Quote-to-Cash trends. Tune in to ...
…
continue reading
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
…
continue reading
Innovation by design is a pilot project of members of DTX and the Design@Business Community in collaboration with the Center for Business Innovation at Chalmers University of Technology to explore podcasts as a way to share community knowledge and gain research insights.
…
continue reading
Welcome to the Sustainable Supply Chain podcast, hosted by Tom Raftery, a seasoned expert at the intersection of technology and sustainability. This podcast is an evolution of the Digital Supply Chain podcast, now with a laser-focused mission: exploring and promoting tech-led sustainability solutions in supply chains across the globe. Every Monday at 7 am CET, join us for insightful and organic conversations that blend professionalism with an informal, enjoyable tone. We don't script our epi ...
…
continue reading

1
Julian Hodges (Sneeyeg) on CPQ, ServiceNow, and Scaling Smart with Governance
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Looking for CPQ solutions and expert advice? In this episode of the CPQ Podcast, we're joined by Julian Hodges, Co-Founder of Sneeyeg, a ServiceNow system integrator specializing in CPQ, billing, and enterprise transformation. With over 20 years of experience from Amdocs, CloudSense, and Salesforce, Julian shares invaluable insights on achieving CP…
…
continue reading
We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/no/podcast/otis-ceo-moving-billions-daily-elevator-evolution-and/id1614211565?i=1000710216293&l=nb What does it take to lead a company that moves 2.4 billion people every day? In this episode, Nicolai Ta…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
Otis CEO: Moving Billions Daily, Elevator Evolution, and Service Excellence
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28What does it take to lead a company that moves 2.4 billion people every day? In this episode, Nicolai Tangen sits down with Judy Marks, President and CEO of Otis, the world’s leading elevator manufacturer. Judy shares insights on innovation, service excellence, and the future of mobility, exploring how Otis is revolutionizing the elevator industry.…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
Inside Origin Cargo Management: A Smarter Path to Supply Chain Resilience
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Send me a message In this episode of the Sustainable Supply Chain podcast, I sat down with Jim McCullen, CTO of Century Supply Chain Solutions, to unpack how technology—particularly AI—is quietly but effectively reshaping the logistics space. Jim’s been with Century for over 30 years, which is practically unheard of in tech. We discussed what’s kep…
…
continue reading

1
🎙 CPQ & PLM Integration: Modular Architecture Insights with Kristian Madsen
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33In this episode, Frank speaks with Kristian Frøstrup Madsen, a CPQ expert with over 13 years at CPC (now part of PDSVision), about how modular thinking is reshaping CPQ for complex manufacturing industries. They cover: How CPC approaches Modular Architecture, Modular PLM, and Modular CPQ Why a product-focused background leads to better CPQ outcomes…
…
continue reading

1
HIGHLIGHTS: Stefano Domenicali - CEO of Formula 1
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/no/podcast/formula-1-ceo-sport-evolution-elite-drivers-and-full/id1614211565?i=1000709213266&l=nb Buckle up as Nicolai Tangen goes behind the scenes with Stefano Domenicali, President and CEO of Formula …
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
Formula 1 CEO: Sport Evolution, Elite Drivers and Full-Speed Leadership
47:17
47:17
Play later
Play later
Lists
Like
Liked
47:17Buckle up as Nicolai Tangen goes behind the scenes with Stefano Domenicali, President and CEO of Formula 1, to explore how the world's most exhilarating motorsport is evolving at breathtaking speed. From transforming a traditionally male-dominated audience to attracting younger, more diverse fans worldwide, Domenicali reveals how F1 has become an e…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
#17 Dave Swidan: Veracyte - Comparing SAP Projects to Salesforce Projects
57:59
57:59
Play later
Play later
Lists
Like
Liked
57:59Featured: Dave Swidan Dave is Senior Director, of Salesforce Engineering at Veracyte, Inc. A Senior Information Technology Leader with a demonstrated history of working in the high tech and Healthcare industry successfully managing large and small Projects/Programs supporting supply chain, sales, pricing, marketing, PLM, service and field service. …
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
#095 - Running AI/ML workloads on top of VMware Cloud Foundation featuring Frank Denneman
52:05
52:05
Play later
Play later
Lists
Like
Liked
52:05I recently read a blog post on AI/ML performance on top of VCF, and figured it was time to invite Frank Denneman back to the podcast. During the episode we discuss VMware Private AI Foundation with NVIDIA, and Frank also mention Ollama as a great starting point. Disclaimer: The thoughts and opinions shared in this podcast are our own/guest(s), and …
…
continue reading

1
Solving Supply Chain Fragmentation: Why Visibility Starts With Better Data
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27Send me a message What if the data you already have could unlock massive sustainability and profitability gains in your supply chain? In this episode of the Sustainable Supply Chain podcast, I’m joined by Danny He, CEO of Soapbox, who makes a compelling case that the real barrier to progress isn’t a lack of technology, it’s fragmented data and disc…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Building a Top Salesforce Revenue Cloud Consultancy: Philip Cunningham's Insights
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31In this episode of the CPQ Podcast, we sit down with Philip Cunningham—CPQ veteran and co-founder of Shiftlogic—to explore his journey from the early BigMachines days through Oracle, SteelBrick, Salesforce, and now to leading one of Europe’s fastest-growing Salesforce Revenue Cloud consultancies. Philip shares how his experiences at global CPQ lead…
…
continue reading
We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/no/podcast/sir-chris-hohn-strategic-investing-long-term-value/id1614211565?i=1000708401082&l=nb In this episode, Nicolai Tangen sits down with Sir Chris Hohn, founder of The Children's Investment Fund Ma…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
Sir Chris Hohn: Strategic Investing, Long-Term Value and Purposeful Philanthropy
1:16:34
1:16:34
Play later
Play later
Lists
Like
Liked
1:16:34In this episode, Nicolai Tangen sits down with Sir Chris Hohn, founder of The Children's Investment Fund Management, one of Europe's most successful hedge funds. The discussion highlights the critical importance of high barriers to entry in investing, the power of long-term thinking, and how intuition shapes investment decisions. Chris also shares …
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
From Waste to Wealth: How Urban Mining Can Solve the Critical Metals Shortage
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38Send me a message What if I told you that most of the platinum and palladium in old diesel vehicles ends up lost or landfilled, even though these are some of the world’s most critical and valuable materials? In this episode of the Sustainable Supply Chain podcast, I sit down with Don Weatherbee, CEO of Regenx, to explore how his company is turning …
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
🎙️ Services CPQ: Rethinking Pricing (Podcast w/ Tracey Shirtcliff)
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40How do you bring structure to the chaos of service pricing? In this episode, Frank talks with Tracey Shirtcliff, founder of ScopeBetter, a "Services CPQ" platform helping creative agencies and consultancies ditch the spreadsheets and build scalable, repeatable pricing models. Tracey shares her journey from building Traffic Live to launching ScopeBe…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading
We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/no/podcast/geoffrey-garrett-modern-leadership-business-education/id1614211565?i=1000706618956&l=nb What does it take to be a great leader in today's complex world? In this episode, Nicolai Tangen talks w…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
Geoffrey Garrett: Modern Leadership, Business Education and Perspectives on Global Economy
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57What does it take to be a great leader in today's complex world? In this episode, Nicolai Tangen talks with Geoffrey Garrett, Dean of USC Marshall School of Business, about modern leadership principles. They discuss the importance of being "human" rather than "heroic" as a leader, balancing technical skills with people skills, and the value of curi…
…
continue reading
In this mini-episode, co-hosts David Masri & Khero Witey reflect on Season 1, what they enjoyed in Season2 and what is to follow for Season 3 and beyond. Talking with the people who own the largest and most complex CRM systems. https://www.crmsuccess.show/ Your Host on LinkedIn: Maz: https://www.linkedin.com/in/davidmasri/ Khero: https://www.linked…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
Rethinking Supply Chain Planning: AI, Risk, and Sustainability with JF Gagné
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02Send me a message UPDATE: Since recording this episode JF has informed me he's no longer working with Pendulum. AI is everywhere right now, but is it actually helping supply chain leaders make smarter, more sustainable decisions? In this episode of the Sustainable Supply Chain podcast, I’m joined by JF Gagné, Chief Product and Strategy Officer at P…
…
continue reading

1
#096 - Crosspost of WSHTF episode featuring me, Duncan Epping!
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07I recently recorded a podcast episode with Johan and Jeffrey for their podcast, When Shit Hits The Fan. It was a fantastic conversation, which I wanted to share with all of you. As such I asked Johan if I could crosspost it. Make sure to subscribe to the WSHTF podcast channel (Apple, Spotify) , as it has some fantastic stories from various fantasti…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading

1
Revolutionizing IT Services Delivery: A Conversation with ScopeStack CEO Jon Scott
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39In this CPQ Podcast episode, Frank Sohn welcomes Jon Scott, Co-Founder and CEO of ScopeStack. With nearly 20 years of experience in the IT services industry, Jon shares the story behind launching ScopeStack in 2018 to eliminate the chaos of spreadsheets and manual SOW creation. Learn how ScopeStack’s innovative platform bridges CRM and PSA systems,…
…
continue reading
We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/no/podcast/sap-ceo-european-tech-leadership-cloud-innovation-and/id1614211565?i=1000705496188&l=nb How does SAP build and scale the systems that global companies rely on every day? In this episode, Nicol…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
SAP CEO: European Tech Leadership, Cloud Innovation, and Performance Culture
58:22
58:22
Play later
Play later
Lists
Like
Liked
58:22How does SAP build and scale the systems that global companies rely on every day? In this episode, Nicolai Tangen speaks with Christian Klein, CEO of SAP, Europe’s largest technology company and one of the world’s leading software providers. They explore SAP's cloud transformation journey, how AI is revolutionizing business productivity, and the ch…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
Using AI to Build Resilient, Sustainable Supply Chains
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49Send me a message In this episode of the Sustainable Supply Chain podcast, I’m joined by Jen Chew, Vice President of Solutions and Consulting at Bristlecone. We get into a practical, no-nonsense conversation about where supply chain sustainability and AI adoption really stand today — beyond the hype. Jen shares how the conversation around AI in sup…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
Reimagining CPQ: Speed, Control, and No-Code with Vendori's Ethan Garonzik
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32In this CPQ Podcast episode, Frank Sohn speaks with Ethan, co-founder of Vendori, a fast-growing CPQ startup focused on reducing implementation time, cutting costs, and delivering faster ROI through a no-code, multi-tenant solution. Ethan shares his journey from Wall Street M&A at Merrill Lynch to leadership roles at SAP and Citrix, where he saw fi…
…
continue reading

1
Episode 118: Become a SaaS provider of multi-tenant applications with SAP BTP
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35In the April 2025 episode of SAP BTP Talk, we explore how existing and potential SAP partners can build, run, and integrate scalable full-stack cloud applications using the SAP Cloud Application Programming Model (CAP) and adhering to the development recommendations set out in the SAP BTP Developer’s Guide. We would touch upon including an ERP-agno…
…
continue reading