Solutions
Solutions
SaaS Security
Featured Solutions
SaaS Supply Chain Security
SaaS Security Posture Management
Audit and Compliance
Use Cases
Shadow SaaS
Access Violations
Excessive Privileges
Account Takeover
Breach Clarity
Threat Detection
AI Security
Featured Solutions
AI Agent Governance
Use Cases
AI Prompt Security
Shadow AI
GenAI Data Leakage
Advanced AI Threat Protection
Platform
Platform →
Products
AI Security
SaaS Security
Technology
Enterprise Trust
Knowledge Graph
Featured Integrations
Agentforce
Copilot Studio
Databricks
GitHub
Google Workspace
Microsoft 365
n8n
Okta
OpenAI
Salesforce
ServiceNow
Snowflake
Workday
View all integrations →
Pricing
Company
Company
Featured Solutions
SaaS Security Threat Report 2025
Ultimate Readiness Guide to Secure AI Agents
Generative AI Security Checklist
6 Steps to SaaS Security Posture Success
Company
About us
Career
News
Partners
Resources
Blog
Customer Stories
Incident Watch
Trust Center
Resource
Resource Center →
Featured Solutions
SaaS Security Threat Report 2025
Ultimate Readiness Guide to Secure AI Agents
Generative AI Security Checklist
6 Steps to SaaS Security Posture Success
Blog
Customer Stories
Incident Watch
Trust Center
Company
Company
About us
Career
News
Partners
Free Trial
Get a Demo
Blog
Featured
Featured articles from Obsidian Security.
Featured Articles
Featured
Legacy Security vs. Obsidian: Why SaaS Security Demands a New Approach
4
MIN
November 10, 2025
Featured
How to Choose a SaaS and AI Security Vendor for Enterprise Scale
2
MIN
September 22, 2025
Featured
Salesforce Misconfiguration Continues to Expose Links to the Public
3
MIN
April 29, 2025
Featured
How Do Attackers Bypass Email Security?
3
MIN
April 28, 2025
Featured
2025 NYDFS Deadlines Expose SaaS Security Gaps—How to Avoid Paying Millions in Fines
5
MIN
April 2, 2025
Featured
Behind the Breach: Malicious Attack on Cyberhaven’s Chrome Extension Developer Team
4
MIN
January 15, 2025
Featured
The rise of BYOD: how to secure personal devices
3
MIN
December 17, 2024
Featured
“Butcher Shop” phishing campaign targets legal, government and construction firms
7
MIN
December 12, 2024
Featured
MFA Arbitrage: What You Need to Know
4
MIN
November 12, 2024
Featured
Australian Regulation CPS 230’s Impending Impact on SaaS
9
MIN
November 7, 2024
Featured
Unpacking the Mamba 2FA Phishing Threat: Why Email Protection Isn’t Enough
6
MIN
October 9, 2024
Featured
Life of a Phish
4
MIN
September 19, 2024
Featured
How Obsidian Security Integrates with CrowdStrike Falcon® Next-Gen SIEM to Accelerate SaaS Threat Detection and Response
5
MIN
September 17, 2024
Featured
Securing Your Snowflake Environments
4
MIN
August 13, 2024
Featured
How to Enact a SaaS Compliance Strategy for NIS2 and DORA
7
MIN
July 16, 2024
Featured
Shadow Linking: The Persistence Vector of SaaS Identity Threat
13
MIN
July 1, 2024
Featured
Dissecting Real World Help Desk Social Engineering Attacks
7
MIN
June 25, 2024
Featured
A Practical Guide for Handling Unauthorized Access to Snowflake
4
MIN
June 3, 2024
Featured
MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise
4
MIN
April 29, 2024
Featured
Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation
4
MIN
April 17, 2024
Featured
Detecting & Blocking Tycoon’s latest AiTM Phishing Kit
3
MIN
March 27, 2024
Featured
Risky Business: How HR Tech Can Hurt Identity Security
5
MIN
March 26, 2024
Featured
Behind The Breach: Microsoft Breach by Russian Hackers
5
MIN
February 2, 2024
Featured
Behind The Breach: MFA Everywhere, Yes. MFA For Everyone, No.
8
MIN
January 25, 2024
Featured
Behind the Breach: Pass-The-Cookie Beyond IdPs
5
MIN
January 9, 2024
Featured
Securing Against OAuth Exploitation: A Step-By-Step Guide
5
MIN
December 19, 2023
Featured
Why to Stop Writing Negative Code
5
MIN
November 22, 2018
No results found.
Please clear your filters and try again.
Featured
Company Update
Data Science & AI
News
Press Release
Privacy
Product Spotlights
Recruiting
Security Advisories
Security Guidance
Threat Research
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.