Security Guidance

Security Guidance
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Rajeev Raghunarayan
Jul 1, 2024
Security Guidance
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Farah Iyer
Jun 14, 2024
Security Guidance
4 minutes

Securing Your Snowflake Environments

Farah Iyer
Jun 3, 2024
Security Guidance
4 minutes

A Practical Guide for Handling Unauthorized Access to Snowflake

Farah Iyer
Jun 3, 2024
Security Guidance
4 minutes

Prevent IdP Bypass and Stop Unauthorized Salesforce Access

Farah Iyer
May 8, 2024
Security Guidance
5 minutes

Emerging Identity Threats: The Muddy Waters of Residential Proxies

Farah Iyer
May 6, 2024
Security Guidance
4 minutes

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Farah Iyer
Apr 17, 2024
Security Guidance
4 minutes

Identifying Client IP Addresses in Okta Audit Logs

Farah Iyer
Apr 4, 2024
Security Guidance
3 minutes

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Farah Iyer
Mar 27, 2024