Featured

Featured
6 minutes

How to Enact a SaaS Compliance Strategy for NIS2 and DORA

Scott Young
Jul 16, 2024
Featured
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Rajeev Raghunarayan
Jul 1, 2024
Featured
7 minutes

Dissecting Real World Help Desk Social Engineering Attacks

Rajeev Raghunarayan
Jun 25, 2024
Featured
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Farah Iyer
Jun 14, 2024
Featured
4 minutes

Securing Your Snowflake Environments

Farah Iyer
Jun 3, 2024
Featured
4 minutes

A Practical Guide for Handling Unauthorized Access to Snowflake

Farah Iyer
Jun 3, 2024
Featured
5 minutes

Emerging Identity Threats: The Muddy Waters of Residential Proxies

Farah Iyer
May 6, 2024
Featured
4 minutes

MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise

Farah Iyer
Apr 29, 2024
Featured
4 minutes

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Farah Iyer
Apr 17, 2024