Featured Resources
- Whitepaper
5 Ways Attackers are Targeting Your SaaS Identities
Understand the top ways cyber attackers leverage identity-based threats to infiltrate SaaS environments.
- Whitepaper
10 Best Practices for Securing SaaS Identities
Secure your SaaS today with practical tips from cybersecurity experts at Obsidian Security and CrowdStrike.
- Webinar
Responding to Identity-Based Attacks with Obsidian Security and CrowdStrike
Listen to Obsidian and esteemed partner CrowdStrike in this insightful webinar on identity-based attacks.
All Resources
- Video
SSPM The Obsidian Way
Everything you need to protect SaaS, all in one place, so you can focus on what matters.
- Brief
The SaaS Security Posture Management (SSPM) Checklist
Key criteria for evaluating SSPM solutions distilled into a succinct checklist to help your team in its research.
- Video
Snowflake Secures its SaaS with Obsidian
Learn how the Snowflake security team uses Obsidian to protect their business-critical applications.
- Whitepaper
The Comprehensive Guide to SSPM
What is SSPM, why is it important, and what role does it play in cybersecurity today?
- Whitepaper
The Definitive Guide to SaaS Security
Key insights on trends across SaaS security, emerging threats, and best practices to implement in your SaaS security strategy.
- Brief
ServiceNow Security Checklist
Key considerations when protecting the workflow automation platform that makes your teams more efficient.
- Brief
Salesforce Security Checklist
Key considerations when protecting the platform at the heart of your sales, marketing, and customer service operations.
- Webinar
What is Session Hijacking, a Technique Used by LAPSUS$?
Learn about SaaS session hijacking and find out how hacker groups like LAPSUS$ use this technique to bypass measures like MFA.
- Report
Osterman Research – Cybersecurity in Financial Services
Understanding emerging and enduring threats to financial services, and the efficacy of today’s cybersecurity solutions.
- Video
Prevent OAuth Abuse in the SaaS Environment
Understand why monitoring third-party OAuth applications are critical to SaaS security
- Video
Identify and Mitigate SaaS Session Hijacking
Prevent attackers from capturing session tokens and establishing persistence within your SaaS environment
- Video
Zero Trust Security for SaaS Applications
Bring your business-critical applications within the framework of zero trust security