by Dana T | Sep 16, 2025 | SaaS Security, Shadow IT
In a hyperconnected AI and SaaS-driven world, organizations rely on countless applications, third-party integrations, and increasingly AI-powered tools to run their operations. These services are woven together through a complex network of API connections and access...
by Dana T | Sep 2, 2025 | SaaS Security, Shadow IT
It’s hard to imagine an organization driving innovation and productivity without integrating various apps and AI tools. SaaS applications, third-party integrations, and AI assistants have become core to how businesses operate. Yet with this progress comes a challenge:...
by Dana T | Jul 3, 2025 | SaaS Security, Supply Chain
The Qantas cyber-attack: when third-party risk becomes a frontline threat The recent cyberattack on Qantas Airlines is more than a headline – it’s a clear warning that supply chain attacks are real, dangerous, and increasingly common. By targeting a third-party...
by Dana T | Feb 18, 2025 | SaaS Security, Shadow IT
Shadow IT is an unfortunate reality in most organizations. Employees downloading SaaS apps onto their work devices without IT’s knowledge may believe these tools make them more productive. However, these apps can expose the organization to the same kinds of threats...
by Dana T | Feb 4, 2025 | SaaS Security
If your 2025 New Year’s resolutions don’t include assessing SaaS-related risks, it’s time to rethink priorities. Over the past four years, we’ve analyzed the usage of 350,000+ SaaS applications, across hundreds of organizations and studied all publicly known...