Today security researchers from TU Graz have published a new side-channel information leak attack using power metering in modern Intel CPUs.
With this side-channel attack on power consumption fluctuations it is possible to extract secret information on the same CPU, like for instance key material from SGX enclaves or the Linux kernel, or KASLR information […]
Your business depends on your SAP operations so the systems that they run on must have near-zero downtime. This includes both planned downtime for updates and fixes as well as unplanned downtime in the event of a system failure. In either event, you won’t lose your SAP HANA data because the built-in System Replication […]