Identity providers and common measures like single sign-on and multi-factor authentication have driven attackers to develop and rely on new techniques for SaaS compromise. Learn some of the techniques they’re using to get into your SaaS environment and the persistence measures they’re using to stay there.

Related Resources

Brief

Detect & Mitigate SaaS Threats with Obsidian

Case study

BigCommerce enhances SaaS threat detection with Obsidian

How BigCommerce built a stronger approach to SaaS security posture management while consolidating disparate point solutions.