CISA Unveils Guidelines to Combat AI-Driven Cyber Threats
AI in SaaS is unavoidable. The top half of ServiceNow’s homepage is dedicated to putting AI to work. Salesforce has 17 mentions of AI or Einstein on its homepage. Copilot dominates the homepage banner for Microsoft, while GitHub touts itself as “the world’s leading AI-powered developer platform.  Make no ... Read More
Securing Financial Operations: Know Your SaaS
Regulatory concerns may have slowed initial SaaS adoption for financial services companies, but today, many rely heavily on apps like Salesforce, Microsoft 365, and ServiceNow to manage their operations. Now, fully invested, financial services companies are faced with the challenge of safeguarding sensitive financial data that is stored off-prem. At ... Read More

SaaS Security as Core CTEM Initiative
In October 2023, analyst firm Gartner® included Continuous Threat Exposure Management (CTEM) in its top ten strategic tech trends for 2024. This appears to be the next step in an evolutionary security process, as organizations must look beyond vulnerability management to truly secure a digital footprint covering SaaS applications and ... Read More

Two Lies, One Truth in Securing Your SaaS Stack
Mythology surrounding technology is pervasive. Although ideas like Macs can’t get viruses, charging a phone overnight destroys the battery, and private browsing prevents tracking have all been debunked, they continue to inform decisions. SaaS security has myths of its own. They involve the prowess of CASB, the rarity of SaaS ... Read More
Safeguarding SaaS Security in Healthcare
Studies detailing the impact cyberattacks have on healthcare quality are rare. Anecdotally, they lead to delayed surgeries and cancer treatments, impact communication between medical facilities, and degrade the system’s ability to provide care. One cyber-attack was cited in an Alabama lawsuit as the reason a baby died. In May of ... Read More

Detecting Externally Facing Resources
In November 2009, as coach of a youth baseball team, I received a Google Sheet with the names, birthdays, contact information, and team names for about 30 kids born between 1997 and 2000. More than 14 years later, I still have access to that document. Today, those players are in ... Read More
A New Paradigm for Business Unit – Security Team Relations
Tension has long stood at the heart of the business team-security relationship. Business units want to meet corporate targets and choose the most effective software to get the job done. Security teams want to ensure data is secure and try to limit risk. When software was all on-prem, the security ... Read More
Securing Supply Chains After Baltimore
In March, a container ship leaving the Helen Delich Bentley Port of Baltimore struck a support piling holding up the Francis Scott Key Bridge, knocking the bridge into the water and killing six workers who were aboard the bridge. With the port closed for an unknown duration and traffic to ... Read More
The New SaaS Security Ceiling – Capabilities You Need In a SaaS Security Platform
There was a time, not long ago, when SaaS security meant managing application configurations. Cutting-edge solutions might have included some type of third-party connected app monitoring tool, or user governance. In today’s SaaS security ecosystem, those capabilities are table stakes. Most security teams have recognized that they cannot consider their ... Read More

Detangling a Confusing Threat Detection for SaaS Landscape
Detection and response sit at the heart of any well-thought-out cybersecurity program. As resilient and strong as perimeter-based defenses are, most security professionals will concede that threats can make their way into the network, device, or application. Detection and response tools come into play after the breach has occurred, but ... Read More