Blog

Updates and insights on cybersecurity, machine learning and the cloud.

Security Guidance
5 minutes

Emerging Identity Threats: The Muddy Waters of Residential Proxies

Noah Corradin
May 6, 2024
Featured
5 minutes

Behind the Breach: Pass-The-Cookie Beyond IdPs

Ryan Wisniewski and Shuyang Wang
Jan 19, 2024
Featured
6 minutes

How to Enact a SaaS Compliance Strategy for NIS2 and DORA

Scott Young
Jul 16, 2024
Featured
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Gavin Zhong & Shuyang Wang
Jul 1, 2024
Featured
7 minutes

Dissecting Real World Help Desk Social Engineering Attacks

Ryan Wisniewski & Rajeev Raghunarayan
Jun 25, 2024
Security Guidance
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Chris Fuller
Jun 14, 2024
Featured
4 minutes

Securing Your Snowflake Environments

Rajeev Raghunarayan and Chris Fuller
Jun 3, 2024
Featured
4 minutes

A Practical Guide for Handling Unauthorized Access to Snowflake

Rajeev Raghunarayan and Chris Fuller
Jun 3, 2024
Security Guidance
4 minutes

Prevent IdP Bypass and Stop Unauthorized Salesforce Access

Chris Fuller and Alexander Vandenberg-Rodes
May 8, 2024
Featured
4 minutes

MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise

Ryan Wisniewski
Apr 29, 2024