
SaaS sprawl and AI adoption surged in 2025, creating new security challenges. Here are the key product updates we delivered to help teams stay ahead.

SaaS sprawl and AI adoption surged in 2025, creating new security challenges. Here are the key product updates we delivered to help teams stay ahead.

A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.

A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.
.avif)
How can you effectively secure your company’s cloud accounts when you don’t know that they exist?
.avif)
How can you effectively secure your company’s cloud accounts when you don’t know that they exist?

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.

CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.

CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.

Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.

Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.

SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.

A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.

A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.

In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.

In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

This year's report findings cast a stark light on an increasingly vulnerable SaaS attack surface.

This year's report findings cast a stark light on an increasingly vulnerable SaaS attack surface.

With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.

With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.

Learn what AI governance is, why it matters, and five actionable strategies to strengthen AI security in your organization.

Learn what AI governance is, why it matters, and five actionable strategies to strengthen AI security in your organization.

How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.

How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.

On March 14, 2025, attackers compromised a popular GitHub action, injecting malicious code to expose sensitive CI/CD secrets within workflow logs.

On March 14, 2025, attackers compromised a popular GitHub action, injecting malicious code to expose sensitive CI/CD secrets within workflow logs.

Within six months, KarmaCheck recovered 150% of its annual investment in Nudge Security.

Within six months, KarmaCheck recovered 150% of its annual investment in Nudge Security.

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk.

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk.

Protecting your organization’s data from NHI risks shouldn’t be a guessing game. Our app-to-app integrations table is here to help.

Protecting your organization’s data from NHI risks shouldn’t be a guessing game. Our app-to-app integrations table is here to help.

The swift success of DeepSeek comes with pressing concerns about data security, regulatory compliance, and the hidden risks of shadow AI.

The swift success of DeepSeek comes with pressing concerns about data security, regulatory compliance, and the hidden risks of shadow AI.

How to implement a structured framework to manage user access rights effectively across diverse applications and environments.

How to implement a structured framework to manage user access rights effectively across diverse applications and environments.
Please enjoy our reflections on the big moments, releases, breaches, and outages that defined the year in cybersecurity.
Please enjoy our reflections on the big moments, releases, breaches, and outages that defined the year in cybersecurity.

Gain deeper insight into your SaaS environments and strengthen your SaaS security posture with our growing library of connected apps.

Gain deeper insight into your SaaS environments and strengthen your SaaS security posture with our growing library of connected apps.

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.
