Nick Harrahill

Avatar photo

Director of Support

About author

Nick Harrahill is the Director of Support at Spin.AI, where he leads customer support, success, and engagement processes.

He is an experienced cybersecurity and business leader. Nick’s industry experience includes leading security teams at enterprise companies (PayPal, eBay) as well as building programs, processes, and operations at cyber security start-ups (Synack, Elevate Security, and Spin.AI).

Credentialed in both cyber security (CISSP) and privacy (CIPP/US), Nick has managed teams focused on vulnerability management, application security, third-party risk, insider threat, incident response, privacy, and various facets of security operations.

In his spare time, Nick enjoys trail running and competing in ultra-marathons, camping, hiking, and enjoying the outdoors.


Featured Work:

Blog Posts by Nick Harrahill

What is SaaS Security?

What is SaaS Security?

Rapid cloud adoption and extensive use of SaaS applications enabled companies to boost their performance.... Read more

What is Cloud Security Posture Management (CSPM)?

What is Cloud Security Posture Management (CSPM)?

Cloud Security Posture Management is becoming an increasingly popular architecture in enterprise cybersecurity. CSPM tools... Read more

The Growing Need for SSPM: Securing Your SaaS Applications

The Growing Need for SSPM: Securing Your SaaS Applications

SSPM is becoming increasingly popular in enterprise security architecture. While it’s encouraging to see the... Read more

Prevent Session Token Theft

Prevent Session Token Theft

In cybersecurity, your weakest link can quickly lead to compromise. Unfortunately, organizations often underestimate a... Read more

CASB vs. SSPM

CASB vs. SSPM

The cloud security tool landscape has rapidly grown in the past 10 years. With many... Read more

Are You Ransomware Ready?

Are You Ransomware Ready?

In recent years, ransomware attacks have skyrocketed, with cybercriminals continually evolving their tactics. In 2022,... Read more

Unlock Operational Bliss for Your SecOps Team in 4 Simple Steps

Unlock Operational Bliss for Your SecOps Team in 4 Simple Steps

SecOps are challenged by rapidly evolving cybersecurity threats. Learn how organizations can empower a SecOps... Read more

Your SSPM checklist

Your SSPM checklist

Security and compliance are your top priority in a SaaS environment. Even apps that are... Read more

Combat Shadow IT with These 4 Steps

Combat Shadow IT with These 4 Steps

A danger lurking in the shadows for businesses today can arguably be among the most... Read more

3 Things to Consider Before a Career as a CISO

3 Things to Consider Before a Career as a CISO

If there is one role that is pivotal to the success of today’s businesses navigating... Read more

The Missing Piece to your Cybersecurity Strategy

The Missing Piece to your Cybersecurity Strategy

Going into the new year, have you checked the “blind spots” in your organization’s cybersecurity... Read more

Beginners Guide to OAuth Authentication

Beginners Guide to OAuth Authentication

Cloud Software-as-a-Service (SaaS) environments are a marvel of innovation and technology resources allowing businesses to... Read more

Microsoft 365 Data Loss Prevention (DLP): A complete guide

Microsoft 365 Data Loss Prevention (DLP): A complete guide

Data Loss Prevention (DLP) is one of many essential security functions in Microsoft 365. This... Read more

An Introduction to OAuth 2.0. Working Principles and Risks

An Introduction to OAuth 2.0. Working Principles and Risks

OAuth 2.0 has become a widespread authorization method for many applications and websites. Learn its... Read more

Cybersecurity Awareness: Importance and Purpose

Cybersecurity Awareness: Importance and Purpose

Do you know that the “human element” causes roughly 85% of data breaches? It can... Read more

Total Cost of Ownership (TCO): Why It’s Important and How to Calculate It

Total Cost of Ownership (TCO): Why It’s Important and How to ...

When estimating the ROI of a product or service, many companies only consider the purchase... Read more

Social Engineering: Definition, Examples, Types of Attacks and How to Prevent Them

Social Engineering: Definition, Examples, Types of Attacks and How ...

Social engineering has become one of the most efficient attack vectors for cybercriminals. This article... Read more

Top SaaS Security Trends to Watch Out For in 2024

Top SaaS Security Trends to Watch Out For in 2024

Since the onset of the pandemic, businesses have accelerated migrations to cloud environments, specifically cloud... Read more