Assess the Risk of Browser Extensions Installed in Your Browser. Add to Chrome.×

Nick Harrahill

Avatar photo

Nick Harrahill

Director of Support at Spin.AI

Nick Harrahill is the Director of Support at Spin.AI, where he leads customer support, success, and engagement processes.

He is an experienced cybersecurity and business leader. Nick’s industry experience includes leading security teams at enterprise companies (PayPal, eBay) as well as building programs, processes, and operations at cyber security start-ups (Synack, Elevate Security, and Spin.AI).

Credentialed in both cyber security (CISSP) and privacy (CIPP/US), Nick has managed teams focused on vulnerability management, application security, third-party risk, insider threat, incident response, privacy, and various facets of security operations.

In his spare time, Nick enjoys trail running and competing in ultra-marathons, camping, hiking, and enjoying the outdoors.


Featured Work:

Blog Posts by Nick Harrahill

The Growing Need for SSPM: Securing Your SaaS Applications

The Growing Need for SSPM: Securing Your SaaS Applications

SSPM is becoming increasingly popular in enterprise security architecture. While it’s encouraging to see the...

Avatar photo

Director of Support

Read more
Prevent Session Token Theft

Prevent Session Token Theft

In cybersecurity, your weakest link can quickly lead to compromise. Unfortunately, organizations often underestimate a...

Avatar photo

Director of Support

Read more
CASB vs. SSPM

CASB vs. SSPM

The cloud security tool landscape has rapidly grown in the past 10 years. With many...

Avatar photo

Director of Support

Read more
Are You Ransomware Ready?

Are You Ransomware Ready?

In recent years, ransomware attacks have skyrocketed, with cybercriminals continually evolving their tactics. In 2022,...

Avatar photo

Director of Support

Read more
Unlock Operational Bliss for Your SecOps Team in 4 Simple Steps

Unlock Operational Bliss for Your SecOps Team in 4 Simple Steps

SecOps are challenged by rapidly evolving cybersecurity threats. Learn how organizations can empower a SecOps...

Avatar photo

Director of Support

Read more
Your SSPM checklist

Your SSPM checklist

Security and compliance are your top priority in a SaaS environment. Even apps that are...

Avatar photo

Director of Support

Read more
Combat Shadow IT with These 4 Steps

Combat Shadow IT with These 4 Steps

A danger lurking in the shadows for businesses today can arguably be among the most...

Avatar photo

Director of Support

Read more
3 Things to Consider Before a Career as a CISO

3 Things to Consider Before a Career as a CISO

If there is one role that is pivotal to the success of today’s businesses navigating...

Avatar photo

Director of Support

Read more
The Missing Piece to your Cybersecurity Strategy

The Missing Piece to your Cybersecurity Strategy

Going into the new year, have you checked the “blind spots” in your organization’s cybersecurity...

Avatar photo

Director of Support

Read more
Beginners Guide to OAuth Authentication

Beginners Guide to OAuth Authentication

Cloud Software-as-a-Service (SaaS) environments are a marvel of innovation and technology resources allowing businesses to...

Avatar photo

Director of Support

Read more
Microsoft 365 Data Loss Prevention (DLP): A complete guide

Microsoft 365 Data Loss Prevention (DLP): A complete guide

Data Loss Prevention (DLP) is one of many essential security functions in Microsoft 365. This...

Avatar photo

Director of Support

Read more
An Introduction to OAuth 2.0. Working Principles and Risks

An Introduction to OAuth 2.0. Working Principles and Risks

OAuth 2.0 has become a widespread authorization method for many applications and websites. Learn its...

Avatar photo

Director of Support

Read more
Cybersecurity Awareness: Importance and Purpose

Cybersecurity Awareness: Importance and Purpose

Do you know that the “human element” causes roughly 85% of data breaches? It can...

Avatar photo

Director of Support

Read more
Total Cost of Ownership (TCO): Why It’s Important and How to Calculate It

Total Cost of Ownership (TCO): Why It’s Important and How to ...

When estimating the ROI of a product or service, many companies only consider the purchase...

Avatar photo

Director of Support

Read more
Social Engineering: Definition, Examples, Types of Attacks and How to Prevent Them

Social Engineering: Definition, Examples, Types of Attacks and How ...

Social engineering has become one of the most efficient attack vectors for cybercriminals. This article...

Avatar photo

Director of Support

Read more
Top SaaS Security Trends to Watch Out For in 2024

Top SaaS Security Trends to Watch Out For in 2024

Since the onset of the pandemic, businesses have accelerated migrations to cloud environments, specifically cloud...

Avatar photo

Director of Support

Read more
SaaS Application Security Risk Assessment and Modeling

SaaS Application Security Risk Assessment and Modeling

SaaS application security risk assessment is critical for companies looking to ensure their critical data...

Avatar photo

Director of Support

Read more
What to Do During Ransomware Attack and After?

What to Do During Ransomware Attack and After?

It is arguably the most dreaded phrase that IT admins and business leaders can hear...

Avatar photo

Director of Support

Read more