Resource Hub
A collection of our latest articles, videos, news, and more.
-
OAuth Token: What It Is, How It Works, and Its Vulnerabilities
Learn how OAuth works and the risks of improper OAuth implementation that may introduce attack vectors on your SaaS estate.
-
Zoom Breach at Federal Reserve Shows the Need for SaaS Security
A SaaS security misconfiguration led to a high-profile Zoom bombing, preventing the Federal Governor from delivering his remarks at a virtual event.
-
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents
Spear-phishing, misconfigurations and vulnerabilities in third-party app integrations demonstrate the complex security challenges facing IT systems.
-
Balancing Act: Navigating the Advantages and Risks of ServiceNow’s New Security Attributes
Security Attributes offer an alternative method for access control via role definitions, designed to be human-readable and offer detailed auditing and logging.
-
Privileged Identity Management (PIM)
Learn how to ensure the bare minimum of privileged access is granted to the right people, at the right time, and for…
-
Payroll Fraud: Analyzing the Attack Lifecycle of a Direct Deposit Scam
Can you identify signals available in audit logs to detect payroll fraud? Learn how to support threat hunting & detection efforts.
-
Learning from the State of Washington’s Data Breach
See how continuous oversight and deep visibility into SaaS configurations can prevent data breaches.
-
Breaking Down APRA CPS 230 Critical SaaS Operations Compliance
Know about APRA CPS 230 mandates? Get actionable steps for your compliance team before they go into effect in July 2025.
-
Avoid Salesforce Security Vulnerabilities When Building Custom Lightning Components in Apex
Lightning Components offer an unlimited amount of functionality. But security vulnerabilities may be introduced within Apex code exploited by a malicious actor.
-
Just How Vulnerable is Your SaaS Supply Chain to Compromise?
Your SaaS supply chain could pose a significant security risk. But SaaS posture monitoring can help prevent attacks.