by Lia Ciner | Jul 31, 2025 | SaaS Security, Shadow IT
Over the past few weeks, a string of high-profile data breaches has put enterprise CRM security under the spotlight. Brands like Qantas, Allianz Life, LVMH, and Adidas have all confirmed unauthorized access involving third-party platforms. Most of them reportedly tie...
by Lia Ciner | Jul 22, 2025 | SaaS Security, Shadow IT
Modern organizations depend on hundreds, sometimes thousands, of SaaS applications to power their operations. While these tools accelerate productivity and innovation, they also create sprawling, complex ecosystems of user identities, data flows, and third-party...
by Ella Siman | Jul 20, 2025 | SaaS Security, Supply Chain
From OAuth to overexposed: 5 risks lurking in your stack After JPMorgan’s open letter to vendors, the industry scrambled to recheck firewalls, tighten endpoints, and update vendor spreadsheets. Check. Check. Check. But here’s the problem: none of that covers your SaaS...
by Lia Ciner | Jul 13, 2025 | SaaS Security, Shadow IT
The SaaS explosion comes with a largely misunderstood set of security risks. Traditional cybersecurity strategies, built around networks, endpoints, and cloud infrastructure, are not touching your SaaS stack. And that’s where serious exposure lies. That’s where SaaS...
by Dana T | Jul 3, 2025 | SaaS Security, Supply Chain
The Qantas cyber-attack: when third-party risk becomes a frontline threat The recent cyberattack on Qantas Airlines is more than a headline – it’s a clear warning that supply chain attacks are real, dangerous, and increasingly common. By targeting a third-party...
by Lia Ciner | Jun 23, 2025 | SaaS Security, Shadow IT
The difference between SaaS security and cloud security is more than just semantics. For CISOs, SOC teams, and enterprise security architects, it’s a critical distinction that directly impacts risk posture, compliance readiness, and incident response efficacy....