Blog
-
How to Simulate Session Hijacking in Your SaaS Applications
In this second blog of our technical series on session hijacking, learn about the challenges associated with detecting compromised sessions and more.
-
Know Before You Go: AppOmni at RSA Conference 2024
Meet AppOmni at RSA 2024, connect with our SaaS security experts, and learn how AppOmni helps organizations prevent SaaS data breaches and…
-
AppOmni Guidance on the Digital Operational Resilience Act (DORA)
Learn how traditional and non-traditional financial services institutions can comply with DORA requirements with AppOmni.
-
Sisense Customer Data Compromise: What to Know
Read about the Sisense data breach, implications of SaaS-to-SaaS connections (or third-party integrations), and how AppOmni can help.
-
Why Your SaaS Security Strategy is Incomplete Without SSPM
Relying on native SaaS security settings and CASBs can leave your organization vulnerable to cybersecurity threats. Read how.
-
What is Session Hijacking? A Technical Overview
Sessions streamline communications between servers and devices. Cloud Detection Engineer Justin Blackburn explains the implications of session hijacking and how to mitigate…
-
SaaS Risks in Healthcare: Anatomy of a Data Exposure at the HSE
SaaS Security Engineer Aaron Costello explains how to handle sensitive data in SaaS apps, as learned from misconfiguration in Ireland’s vaccination portal…
-
How to Secure Your SaaS Environment from Three Common SaaS Misconfigurations
Gain insights into three prevalent SaaS misconfigurations overlooked by security teams and essential information regarding SaaS risk management.
-
SSPM vs CSPM: Does Your Organization Need Both?
Read about the difference between SSPM vs CSPM, and which one you should prioritize for your organizations SaaS security.
-
The Power of SaaS Security in Phishing Defense
Phishing has evolved. Once easy to detect, phishing capitalizes on tech advancements and messaging improvements to make the deception difficult to recognize.









