Security Guidance

Security Guidance
4 minutes

Life of a Phish

Gabby Ortiz
Sep 19, 2024
Security Guidance
6 minutes

New OAuth Phishing Threat: Exploiting Vulnerabilities in SaaS Integration Platforms

Farah Iyer
Sep 3, 2024
Security Guidance
4 minutes

Securing Your Snowflake Environments

Farah Iyer
Aug 13, 2024
Security Guidance
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Rajeev Raghunarayan
Jul 1, 2024
Security Guidance
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Farah Iyer
Jun 14, 2024
Security Guidance
4 minutes

A Practical Guide for Handling Unauthorized Access to Snowflake

Farah Iyer
Jun 3, 2024
Security Guidance
4 minutes

Prevent IdP Bypass and Stop Unauthorized Salesforce Access

Farah Iyer
May 8, 2024
Security Guidance
5 minutes

Emerging Identity Threats: The Muddy Waters of Residential Proxies

Farah Iyer
May 6, 2024
Security Guidance
4 minutes

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Farah Iyer
Apr 17, 2024