Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.
Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.
Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.
Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.
LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.
LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.
On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.
On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.
To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.
To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.
Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Why SaaS security should be a core element of your IT security and governance program.
Why SaaS security should be a core element of your IT security and governance program.
A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Learn how top analysts are viewing the emerging SaaS security and governance space.
Learn how top analysts are viewing the emerging SaaS security and governance space.
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Detect and fix risks and misconfigurations in Google Workspace and Microsoft 365 with Nudge Security.
Detect and fix risks and misconfigurations in Google Workspace and Microsoft 365 with Nudge Security.
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Enjoy a step-by-step explanation of the challenges and solutions for our capture the flag competition.
Enjoy a step-by-step explanation of the challenges and solutions for our capture the flag competition.
How to use spend data and insights to prioritize your SaaS rationalization efforts, maximize impact, and earn quick wins.
How to use spend data and insights to prioritize your SaaS rationalization efforts, maximize impact, and earn quick wins.
While the convenience of integration can boost productivity, the cybersecurity risks can be significant.
While the convenience of integration can boost productivity, the cybersecurity risks can be significant.
While we are proud to be included in this report, we are even more encouraged by the recognition of this emerging market.
While we are proud to be included in this report, we are even more encouraged by the recognition of this emerging market.