All Resources

The SaaS Security Posture Management (SSPM) Checklist
  • Briefs

The SaaS Security Posture Management (SSPM) Checklist

Key criteria for evaluating SSPM solutions distilled into a succinct checklist to help your team in its research.

Snowflake Secures its SaaS with Obsidian
  • Videos

Snowflake Secures its SaaS with Obsidian

Learn how the Snowflake security team uses Obsidian to protect their business-critical applications.

The Comprehensive Guide to SSPM
  • Whitepapers

The Comprehensive Guide to SSPM

What is SSPM, why is it important, and what role does it play in cybersecurity today?

The Definitive Guide to SaaS Security
  • Whitepapers

The Definitive Guide to SaaS Security

Key insights on trends across SaaS security, emerging threats, and best practices to implement in your SaaS security strategy.

ServiceNow Security Checklist
  • Briefs

ServiceNow Security Checklist

Key considerations when protecting the workflow automation platform that makes your teams more efficient.

Salesforce Security Checklist
  • Briefs

Salesforce Security Checklist

Key considerations when protecting the platform at the heart of your sales, marketing, and customer service operations.

What is Session Hijacking, a Technique Used by LAPSUS$?
  • Webinars

What is Session Hijacking, a Technique Used by LAPSUS$?

Learn about SaaS session hijacking and find out how hacker groups like LAPSUS$ use this technique to bypass measures like MFA.

Osterman Research – Cybersecurity in Financial Services
  • Reports

Osterman Research – Cybersecurity in Financial Services

Understanding emerging and enduring threats to financial services, and the efficacy of today’s cybersecurity solutions.

Prevent OAuth Abuse in the SaaS Environment
  • Videos

Prevent OAuth Abuse in the SaaS Environment

Understand why monitoring third-party OAuth applications are critical to SaaS security

Identify and Mitigate SaaS Session Hijacking
  • Videos

Identify and Mitigate SaaS Session Hijacking

Prevent attackers from capturing session tokens and establishing persistence within your SaaS environment

Zero Trust Security for SaaS Applications
  • Videos

Zero Trust Security for SaaS Applications

Bring your business-critical applications within the framework of zero trust security

The Elements of Comprehensive SaaS Security
  • Videos

The Elements of Comprehensive SaaS Security

Learn how the evolution of cybersecurity informs the components necessary to protect SaaS