
New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk.

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk.

Protecting your organization’s data from NHI risks shouldn’t be a guessing game. Our app-to-app integrations table is here to help.

Protecting your organization’s data from NHI risks shouldn’t be a guessing game. Our app-to-app integrations table is here to help.

The swift success of DeepSeek comes with pressing concerns about data security, regulatory compliance, and the hidden risks of shadow AI.

The swift success of DeepSeek comes with pressing concerns about data security, regulatory compliance, and the hidden risks of shadow AI.

How to implement a structured framework to manage user access rights effectively across diverse applications and environments.

How to implement a structured framework to manage user access rights effectively across diverse applications and environments.
Please enjoy our reflections on the big moments, releases, breaches, and outages that defined the year in cybersecurity.
Please enjoy our reflections on the big moments, releases, breaches, and outages that defined the year in cybersecurity.

Gain deeper insight into your SaaS environments and strengthen your SaaS security posture with our growing library of connected apps.

Gain deeper insight into your SaaS environments and strengthen your SaaS security posture with our growing library of connected apps.

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.

Proactively find and fix misconfigurations in Okta, Google Workspace, and Microsoft 365 with our new SSPM capabilities.

Proactively find and fix misconfigurations in Okta, Google Workspace, and Microsoft 365 with our new SSPM capabilities.

With a new, deeper integration for Okta, Nudge Security customers can further harden and protect their critical identity stack.

With a new, deeper integration for Okta, Nudge Security customers can further harden and protect their critical identity stack.

Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.

Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.

LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.

LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.

On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.

On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.

To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.

To celebrate our second birthday, we're reflecting on our journey—and all the new features we've added to help customers scale SaaS security and governance.

Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.

Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.

Why SaaS security should be a core element of your IT security and governance program.

Why SaaS security should be a core element of your IT security and governance program.

How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.

How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.

Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.

Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.

Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.

Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.

Learn how top analysts are viewing the emerging SaaS security and governance space.

Learn how top analysts are viewing the emerging SaaS security and governance space.

While AI tools like ChatGPT can be a boon for productivity, they also raise security and privacy concerns. What can IT and security teams do to minimize the risks?

While AI tools like ChatGPT can be a boon for productivity, they also raise security and privacy concerns. What can IT and security teams do to minimize the risks?

Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.

Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.

With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.

With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.

Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.

Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
