SaaS

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden […]

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution Read More »

IT leaders alarmed by generative AI’s SaaS security implications

IT leaders alarmed by generative AI’s SaaS security implications 29/08/2023 at 06:03 By Help Net Security IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow Software. 96% of respondents indicated they were still ‘confident or very confident’ in their organization’s

React to this headline:

Loading spinner

IT leaders alarmed by generative AI’s SaaS security implications Read More »

53% of SaaS licenses remain unused

53% of SaaS licenses remain unused 04/07/2023 at 06:38 By Help Net Security Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending and governance challenges from spiraling out of control, according to Productiv. Productiv analyzed how nearly 100 million SaaS licenses were used over

React to this headline:

Loading spinner

53% of SaaS licenses remain unused Read More »

Malicious Tools in the Underground: Investigating their Propagation

Malicious Tools in the Underground: Investigating their Propagation 16/06/2023 at 19:04 By cybleinc Cyble Research & Intelligence Labs investigates the recent promulgation of Malicious Tools in underground forums. The post Malicious Tools in the Underground: Investigating their Propagation appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this

React to this headline:

Loading spinner

Malicious Tools in the Underground: Investigating their Propagation Read More »

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint 09/06/2023 at 15:46 By Kevin Townsend A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint. The post SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint Read More »

Current SaaS security strategies don’t go far enough

Current SaaS security strategies don’t go far enough 07/06/2023 at 06:04 By Help Net Security Many recent breaches and data leaks have been tied back to SaaS apps, according to Adaptive Shield. “We wanted to gain a deeper understanding of the incidents within SaaS applications and how organizations are building their threat prevention and detection

React to this headline:

Loading spinner

Current SaaS security strategies don’t go far enough Read More »

CISO-level tips for securing corporate data in the cloud

CISO-level tips for securing corporate data in the cloud 24/05/2023 at 07:17 By Help Net Security The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps connected to their corporate SaaS

React to this headline:

Loading spinner

CISO-level tips for securing corporate data in the cloud Read More »

Scroll to Top