Blog Posts by Nick Harrahill
What is SaaS Security?
June 28, 2023Rapid cloud adoption and extensive use of SaaS applications enabled companies to boost their performance.... Read more
What is Cloud Security Posture Management (CSPM)?
June 27, 2023Cloud Security Posture Management is becoming an increasingly popular architecture in enterprise cybersecurity. CSPM tools... Read more
The Growing Need for SSPM: Securing Your SaaS Applications
June 21, 2023SSPM is becoming increasingly popular in enterprise security architecture. While it’s encouraging to see the... Read more
Prevent Session Token Theft
June 12, 2023In cybersecurity, your weakest link can quickly lead to compromise. Unfortunately, organizations often underestimate a... Read more
CASB vs. SSPM
June 1, 2023The cloud security tool landscape has rapidly grown in the past 10 years. With many... Read more
Are You Ransomware Ready?
April 28, 2023In recent years, ransomware attacks have skyrocketed, with cybercriminals continually evolving their tactics. In 2022,... Read more
Unlock Operational Bliss for Your SecOps Team in 4 Simple Steps
April 26, 2023SecOps are challenged by rapidly evolving cybersecurity threats. Learn how organizations can empower a SecOps... Read more
Your SSPM checklist
February 7, 2023Security and compliance are your top priority in a SaaS environment. Even apps that are... Read more
Combat Shadow IT with These 4 Steps
January 6, 2023A danger lurking in the shadows for businesses today can arguably be among the most... Read more
3 Things to Consider Before a Career as a CISO
January 5, 2023If there is one role that is pivotal to the success of today’s businesses navigating... Read more
The Missing Piece to your Cybersecurity Strategy
January 5, 2023Going into the new year, have you checked the “blind spots” in your organization’s cybersecurity... Read more
Beginners Guide to OAuth Authentication
January 5, 2023Cloud Software-as-a-Service (SaaS) environments are a marvel of innovation and technology resources allowing businesses to... Read more
Microsoft 365 Data Loss Prevention (DLP): A complete guide
January 3, 2023Data Loss Prevention (DLP) is one of many essential security functions in Microsoft 365. This... Read more
An Introduction to OAuth 2.0. Working Principles and Risks
December 29, 2022OAuth 2.0 has become a widespread authorization method for many applications and websites. Learn its... Read more
Cybersecurity Awareness: Importance and Purpose
December 28, 2022Do you know that the “human element” causes roughly 85% of data breaches? It can... Read more
Total Cost of Ownership (TCO): Why It’s Important and How to ...
December 9, 2022When estimating the ROI of a product or service, many companies only consider the purchase... Read more
Social Engineering: Definition, Examples, Types of Attacks and How ...
December 7, 2022Social engineering has become one of the most efficient attack vectors for cybercriminals. This article... Read more
Top SaaS Security Trends to Watch Out For in 2024
December 6, 2022Since the onset of the pandemic, businesses have accelerated migrations to cloud environments, specifically cloud... Read more