Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.
Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.
Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
As HIPAA modernizes its standards for a SaaS & AI-powered world, healthcare organizations require new approaches to safeguarding access to sensitive data.
As HIPAA modernizes its standards for a SaaS & AI-powered world, healthcare organizations require new approaches to safeguarding access to sensitive data.
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
How to streamline all aspects of your SaaS data governance process, ensuring that technology is onboarded, managed, and secured properly.
How to streamline all aspects of your SaaS data governance process, ensuring that technology is onboarded, managed, and secured properly.
How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.
A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.
How can you effectively secure your company’s cloud accounts when you don’t know that they exist?
How can you effectively secure your company’s cloud accounts when you don’t know that they exist?
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.
Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.
This year's report findings cast a stark light on an increasingly vulnerable SaaS attack surface.
This year's report findings cast a stark light on an increasingly vulnerable SaaS attack surface.
With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.
With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.
Learn what AI governance is, why it matters, and five actionable strategies to strengthen AI security in your organization.
Learn what AI governance is, why it matters, and five actionable strategies to strengthen AI security in your organization.