
Resource Hub
A collection of our latest articles, videos, news, and more.
-
OAuth Grants and Phishing: A Deadly Combination
A phishing campaign that compromised over 12,000 GitHub repositories highlights how a seemingly harmless email can have large-scale repercussions. As awareness of…
-
New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest
Aaron Costello, chief of SaaS security research at AppOmni, emphasized that the vulnerability was severe because it allowed unauthenticated access to full…
-
Old ServiceNow vulnerabilities could cause havoc for unpatched customers
“The fact that full database access could be achieved by an entirely unauthenticated actor is unique,” said Aaron Costello, chief of SaaS…
-
How Rightmove secures and optimizes its expanding SaaS estate with AppOmni
Learn how Sprinklr worked through its SaaS security challenges with AppOmni’s SSPM platform and provided real-time insights into application settings.
-
How to build a better insider risk program
AppOmni co-founder and CTO Brian Soby said that people tend to forget that insider risk doesn’t just account for insiders with malicious…
-
10 Key Detections for M365 Security
Download the checklist on the key detections for Microsoft 365 Security to start strengthening your M365 security posture today.
-
From Teenage Gamer to SaaS Security Guru: The Untold Journey of a Cybersecurity Pro Aaron Costello
In this conversation, host Joe South and AppOmni’s Aaron Costello delve into the challenges organizations face regarding SaaS application risks, the significance…
-
CISO ExecNet CEO Interviews: Brendan O’Connor, AppOmni
In this interview, AppOmni CEO Brendan O’Connor talks with CISO ExecNet Founder Bill Sieglein about the experience as a CISO that led…
-
Simplifying SaaS Security with the Power of GenAI
Learn how AI is transforming SaaS security and why AI-driven security is not just an advantage to your SaaS ecosystems, but a…
-
What to Look for in SaaS Threat Detection
Read the blog for a better understanding of how to approach SaaS threat detection, what problems to look for, how to mitigate…