by Tamar Cohen | Mar 17, 2025 | ITDR, SaaS Security
Breaking down the attack chain: How SecOps build incident reports SecOps (SOC) teams face daily challenges when it comes to detecting and responding to cyber-attacks. Most security solutions flood them with alerts from various tools, each flagging potential risks....
by Lia Ciner | Mar 10, 2025 | ITDR, SaaS Security
Identity threats in SaaS environments have become a primary attack vector, with cybercriminals exploiting compromised credentials, privilege misuse, and authentication weaknesses to infiltrate organizations. Security measures such as endpoint detection and response...
by Jack Blumenthal | Feb 21, 2025 | SaaS Security
What is DeepSeek? DeepSeek, the Chinese AI startup, has been making headlines recently due to its impressive AI models. In particular, its DeepSeek-R1 reasoning model is notable for its comparable performance to top AI systems like OpenAI’s GPT-4, while being...
by Staff Writer | Feb 18, 2025 | SaaS Security, Shadow IT
Shadow IT is an unfortunate reality in most organizations. Employees downloading SaaS apps onto their work devices without IT’s knowledge may believe these tools make them more productive. However, these apps can expose the organization to the same kinds of threats...
by Brian Fravel | Feb 4, 2025 | SaaS Security
If your 2025 New Year’s resolutions don’t include assessing SaaS-related risks, it’s time to rethink priorities. Over the past four years, we’ve analyzed the usage of 350,000+ SaaS applications, across hundreds of organizations and studied all publicly known...
by Staff Writer | Jan 30, 2025 | Cloud, SaaS Security
BOD 25-01 and Misconfiguration Management BOD 25-01 (Binding Operational Directive 25-01) is a directive from CISA that requires U.S. federal agencies to harden and monitor SaaS security settings to reduce risks from misconfigurations. It mandates continuous...