Blog
-
Navigating InfoSec Requirements of APRA CPS 234
See how Australian financial services organizations — and their SaaS providers — can comply with this critical regulation’s information security standards.
-
How to Safeguard PHI From Healthcare SaaS Risks
Learn five critical steps to strengthen your organization’s security culture, protect PHI, and maintain regulatory compliance.
-
OAuth Token: What It Is, How It Works, and Its Vulnerabilities
Learn how OAuth works and the risks of improper OAuth implementation that may introduce attack vectors on your SaaS estate.
-
Zoom Breach at Federal Reserve Shows the Need for SaaS Security
A SaaS security misconfiguration led to a high-profile Zoom bombing, preventing the Federal Governor from delivering his remarks at a virtual event.
-
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents
Spear-phishing, misconfigurations and vulnerabilities in third-party app integrations demonstrate the complex security challenges facing IT systems.
-
The Risks of OAuth Tokens and 3rd Party Apps to SaaS Security
AppOmni CEO explains the risks enterprises face from OAuth tokens and third-party SaaS apps.
-
Balancing Act: Navigating the Advantages and Risks of ServiceNow’s New Security Attributes
Security Attributes offer an alternative method for access control via role definitions, designed to be human-readable and offer detailed auditing and logging.
-
Learning from the State of Washington’s Data Breach
See how continuous oversight and deep visibility into SaaS configurations can prevent data breaches.
-
Breaking Down APRA CPS 230 Critical SaaS Operations Compliance
Know about APRA CPS 230 mandates? Get actionable steps for your compliance team before they go into effect in July 2025.
-
Just How Vulnerable is Your SaaS Supply Chain to Compromise?
Your SaaS supply chain could pose a significant security risk. But SaaS posture monitoring can help prevent attacks.









