SaaS

4 ways to use time to level up your security monitoring

4 ways to use time to level up your security monitoring 2025-10-03 at 09:09 By Help Net Security SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage platforms, even with lower-cost archive tiers, long-term retention at full fidelity […]

React to this headline:

Loading spinner

4 ways to use time to level up your security monitoring Read More »

CSA Unveils SaaS Security Controls Framework to Ease Complexity

CSA Unveils SaaS Security Controls Framework to Ease Complexity 2025-09-25 at 15:33 By Kevin Townsend New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence. The post CSA Unveils SaaS Security Controls Framework to Ease Complexity appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

CSA Unveils SaaS Security Controls Framework to Ease Complexity Read More »

New framework sets baseline for SaaS security controls

New framework sets baseline for SaaS security controls 2025-09-25 at 10:12 By Anamarija Pogorelec Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own settings, permissions, and logs, and most third-party risk processes only look at the vendor’s overall security, not the app itself. That

React to this headline:

Loading spinner

New framework sets baseline for SaaS security controls Read More »

Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise

Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise 2025-09-03 at 16:13 By Zeljka Zorz Cloudflare has also been affected by the Salesloft Drift breach, the US web infrastructure and security company confirmed on Tuesday, and the attackers got their hands on 104 Cloudflare API tokens. “We have identified no suspicious activity associated

React to this headline:

Loading spinner

Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise Read More »

DevOps in the cloud and what is putting your data at risk

DevOps in the cloud and what is putting your data at risk 2025-08-22 at 07:33 By Help Net Security In this Help Net Security video, Greg Bak, Head of Product Enablement at GitProtect, walks through some of the biggest security risks DevOps teams are dealing with. He covers how AI tools can introduce vulnerabilities, including

React to this headline:

Loading spinner

DevOps in the cloud and what is putting your data at risk Read More »

From legacy to SaaS: Why complexity is the enemy of enterprise security

From legacy to SaaS: Why complexity is the enemy of enterprise security 2025-08-11 at 08:32 By Mirko Zorz In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balance

React to this headline:

Loading spinner

From legacy to SaaS: Why complexity is the enemy of enterprise security Read More »

Most AI and SaaS apps are outside IT’s control

Most AI and SaaS apps are outside IT’s control 2025-06-26 at 07:08 By Help Net Security 60% of enterprise SaaS and AI applications operate outside IT’s visibility, according to CloudEagle.ai. This surge in invisible IT is fueling a crisis in AI identity governance, leading to increased breaches, audit failures, and compliance risk across enterprises. A

React to this headline:

Loading spinner

Most AI and SaaS apps are outside IT’s control Read More »

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth 2025-06-25 at 17:26 By Kevin Townsend New research suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth variant despite the basic issue being disclosed in June 2023. The post Thousands of SaaS Apps Could Still Be Susceptible to nOAuth appeared first on

React to this headline:

Loading spinner

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Read More »

CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform

CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform 2025-05-28 at 17:30 By daksh sharma CISA issues urgent update on threats targeting Commvault’s Metallic SaaS platform, widely used for Microsoft 365 backups. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform Read More »

Closing security gaps in multi-cloud and SaaS environments

Closing security gaps in multi-cloud and SaaS environments 2025-05-20 at 09:06 By Mirko Zorz In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research on the state of cloud and SaaS security. He talks about how siloed visibility, fragmented tools, and a lack of incident

React to this headline:

Loading spinner

Closing security gaps in multi-cloud and SaaS environments Read More »

The hidden risk in SaaS: Why companies need a digital identity exit strategy

The hidden risk in SaaS: Why companies need a digital identity exit strategy 2025-03-21 at 08:31 By Help Net Security In the face of sudden trade restrictions, sanctions, or policy shifts, relying on SaaS providers outside your region for identity services is a gamble that companies can no longer afford to take. With trade disputes

React to this headline:

Loading spinner

The hidden risk in SaaS: Why companies need a digital identity exit strategy Read More »

Only 3% of organizations have a dedicated budget for SaaS security

Only 3% of organizations have a dedicated budget for SaaS security 2025-02-03 at 06:48 By Help Net Security Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often exceeding expectations, according to Cloud Security Alliance. Security teams are struggling with a growing attack surface Disconcertingly,

React to this headline:

Loading spinner

Only 3% of organizations have a dedicated budget for SaaS security Read More »

Who handles what? Common misconceptions about SaaS security responsibilities

Who handles what? Common misconceptions about SaaS security responsibilities 2024-12-09 at 07:33 By Mirko Zorz In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common misconceptions do you encounter about the

React to this headline:

Loading spinner

Who handles what? Common misconceptions about SaaS security responsibilities Read More »

How to choose secure, verifiable technologies?

How to choose secure, verifiable technologies? 2024-12-06 at 12:16 By Zeljka Zorz The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services

React to this headline:

Loading spinner

How to choose secure, verifiable technologies? Read More »

Cross-IdP impersonation bypasses SSO protections

Cross-IdP impersonation bypasses SSO protections 2024-11-19 at 18:22 By Help Net Security Cross-IdP impersonation – a technique that enables attackers to hijack the single sign-on (SSO) process to gain unauthorized access to downstream software-as-a-service (SaaS) applications without compromising a company’s primary identity provider (IdP) – is expected to gain popularity with attackers, according to Push

React to this headline:

Loading spinner

Cross-IdP impersonation bypasses SSO protections Read More »

Why companies are struggling to keep up with SaaS data protection

Why companies are struggling to keep up with SaaS data protection 2024-10-17 at 06:01 By Help Net Security While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents

React to this headline:

Loading spinner

Why companies are struggling to keep up with SaaS data protection Read More »

The case for enterprise exposure management

The case for enterprise exposure management 2024-10-07 at 08:01 By Help Net Security For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and remediate issues, had broad purview,

React to this headline:

Loading spinner

The case for enterprise exposure management Read More »

Human firewalls are essential to keeping SaaS environments safe

Human firewalls are essential to keeping SaaS environments safe 2024-09-06 at 08:01 By Help Net Security Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, Jira, Zendesk and others. We recently surveyed security leaders and CISOs on top data security

React to this headline:

Loading spinner

Human firewalls are essential to keeping SaaS environments safe Read More »

A third of organizations suffered a SaaS data breach this year

A third of organizations suffered a SaaS data breach this year 2024-09-03 at 06:01 By Help Net Security While SaaS security is finally getting the attention it deserves, there’s still a significant gap between intent and implementation. Ad hoc strategies and other practices still fall short of a security program. The move toward decentralization has

React to this headline:

Loading spinner

A third of organizations suffered a SaaS data breach this year Read More »

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

When Convenience Costs: CISOs Struggle With SaaS Security Oversight 2024-08-27 at 16:31 By Kevin Townsend SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When Convenience Costs: CISOs Struggle With SaaS Security

React to this headline:

Loading spinner

When Convenience Costs: CISOs Struggle With SaaS Security Oversight Read More »

Scroll to Top