Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.
SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.
To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.
To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.
Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Why SaaS security should be a core element of your IT security and governance program.
Why SaaS security should be a core element of your IT security and governance program.
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
While AI tools like ChatGPT can be a boon for productivity, they also raise security and privacy concerns. What can IT and security teams do to minimize the risks?
While AI tools like ChatGPT can be a boon for productivity, they also raise security and privacy concerns. What can IT and security teams do to minimize the risks?
Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.
Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.
With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Detect and fix risks and misconfigurations in Google Workspace and Microsoft 365 with Nudge Security.
Detect and fix risks and misconfigurations in Google Workspace and Microsoft 365 with Nudge Security.
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Why Nudge Security’s approach to SaaS discovery is so effective at finding shadow IT and business-led IT.
Why Nudge Security’s approach to SaaS discovery is so effective at finding shadow IT and business-led IT.
Enjoy a step-by-step explanation of the challenges and solutions for our capture the flag competition.
Enjoy a step-by-step explanation of the challenges and solutions for our capture the flag competition.
Connecting Google Drive to ChatGPT grants extensive permissions, posing risks. Here's how to track activity within Google Workspace, or with Nudge Security.
Connecting Google Drive to ChatGPT grants extensive permissions, posing risks. Here's how to track activity within Google Workspace, or with Nudge Security.
While the convenience of integration can boost productivity, the cybersecurity risks can be significant.
While the convenience of integration can boost productivity, the cybersecurity risks can be significant.
While we are proud to be included in this report, we are even more encouraged by the recognition of this emerging market.
While we are proud to be included in this report, we are even more encouraged by the recognition of this emerging market.
From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
Learn how our AI dashboard helps you to visualize and manage AI adoption at your organization.
Learn how our AI dashboard helps you to visualize and manage AI adoption at your organization.
Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
How to use spend data and insights to prioritize your SaaS rationalization efforts, maximize impact, and earn quick wins.
How to use spend data and insights to prioritize your SaaS rationalization efforts, maximize impact, and earn quick wins.