SaaS

How organizations can navigate identity security risks in 2024

How organizations can navigate identity security risks in 2024 2024-02-29 at 07:34 By Mirko Zorz Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and operational efficiency. In this Help Net Security interview, Deepak Taneja, CEO of Zilla Security, discusses identity security risks […]

React to this headline:

Loading spinner

How organizations can navigate identity security risks in 2024 Read More »

Great security or great UX? Both, please

Great security or great UX? Both, please 2024-01-30 at 08:02 By Help Net Security A new user is signing up for a SaaS application. On the one hand, UX teams want that user to get into the app as quickly as possible. On the other hand, security teams want the user to strongly validate their

React to this headline:

Loading spinner

Great security or great UX? Both, please Read More »

3 ways to combat rising OAuth SaaS attacks

3 ways to combat rising OAuth SaaS attacks 2024-01-16 at 07:31 By Help Net Security OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam activity using the

React to this headline:

Loading spinner

3 ways to combat rising OAuth SaaS attacks Read More »

5 pivotal cybersecurity trends for 2024

5 pivotal cybersecurity trends for 2024 2023-12-28 at 07:01 By Help Net Security In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing

React to this headline:

Loading spinner

5 pivotal cybersecurity trends for 2024 Read More »

Generative AI is shaping future incident management processes

Generative AI is shaping future incident management processes 15/11/2023 at 08:03 By Help Net Security Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst a surge in service incidents, according to Transposit. Despite a majority of respondents (59.4%) who have a defined incident management

React to this headline:

Loading spinner

Generative AI is shaping future incident management processes Read More »

Product showcase: Nudge Security’s SaaS security and governance platform

Product showcase: Nudge Security’s SaaS security and governance platform 15/11/2023 at 07:01 By Help Net Security In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to productivity and innovation in

React to this headline:

Loading spinner

Product showcase: Nudge Security’s SaaS security and governance platform Read More »

AI threat landscape: Model theft and inference attacks emerge as top concerns

AI threat landscape: Model theft and inference attacks emerge as top concerns 30/10/2023 at 08:31 By Mirko Zorz Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will invest nearly $16 billion worldwide on GenAI solutions in 2023, according to IDC. In this Help Net

React to this headline:

Loading spinner

AI threat landscape: Model theft and inference attacks emerge as top concerns Read More »

DIY attack surface management: Simple, cost-effective and actionable perimeter insights

DIY attack surface management: Simple, cost-effective and actionable perimeter insights 16/10/2023 at 11:46 By Help Net Security Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being decommissioned, and ongoing migrations to cloud providers. Assets can be created and forgotten about, only

React to this headline:

Loading spinner

DIY attack surface management: Simple, cost-effective and actionable perimeter insights Read More »

Factors leading to organizations losing control over IT and security environments

Factors leading to organizations losing control over IT and security environments 04/10/2023 at 06:02 By Help Net Security Companies are challenged with the growing need to connect everything in their business while maintaining control over their security, productivity, and competitive growth, according to Cloudflare. “Today, the big clouds have built business models on capturing your

React to this headline:

Loading spinner

Factors leading to organizations losing control over IT and security environments Read More »

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution Read More »

IT leaders alarmed by generative AI’s SaaS security implications

IT leaders alarmed by generative AI’s SaaS security implications 29/08/2023 at 06:03 By Help Net Security IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow Software. 96% of respondents indicated they were still ‘confident or very confident’ in their organization’s

React to this headline:

Loading spinner

IT leaders alarmed by generative AI’s SaaS security implications Read More »

53% of SaaS licenses remain unused

53% of SaaS licenses remain unused 04/07/2023 at 06:38 By Help Net Security Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending and governance challenges from spiraling out of control, according to Productiv. Productiv analyzed how nearly 100 million SaaS licenses were used over

React to this headline:

Loading spinner

53% of SaaS licenses remain unused Read More »

Malicious Tools in the Underground: Investigating their Propagation

Malicious Tools in the Underground: Investigating their Propagation 16/06/2023 at 19:04 By cybleinc Cyble Research & Intelligence Labs investigates the recent promulgation of Malicious Tools in underground forums. The post Malicious Tools in the Underground: Investigating their Propagation appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this

React to this headline:

Loading spinner

Malicious Tools in the Underground: Investigating their Propagation Read More »

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint 09/06/2023 at 15:46 By Kevin Townsend A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint. The post SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint Read More »

Current SaaS security strategies don’t go far enough

Current SaaS security strategies don’t go far enough 07/06/2023 at 06:04 By Help Net Security Many recent breaches and data leaks have been tied back to SaaS apps, according to Adaptive Shield. “We wanted to gain a deeper understanding of the incidents within SaaS applications and how organizations are building their threat prevention and detection

React to this headline:

Loading spinner

Current SaaS security strategies don’t go far enough Read More »

CISO-level tips for securing corporate data in the cloud

CISO-level tips for securing corporate data in the cloud 24/05/2023 at 07:17 By Help Net Security The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps connected to their corporate SaaS

React to this headline:

Loading spinner

CISO-level tips for securing corporate data in the cloud Read More »

Scroll to Top