How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack CampaignRead Now

Nick Harrahill

Avatar photo

Nick Harrahill

Director of Support at Spin.AI

Nick Harrahill is the Director of Support at Spin.AI, where he leads customer support, success, and engagement processes.

He is an experienced cybersecurity and business leader. Nick’s industry experience includes leading security teams at enterprise companies (PayPal, eBay) as well as building programs, processes, and operations at cyber security start-ups (Synack, Elevate Security, and Spin.AI).

Credentialed in both cyber security (CISSP) and privacy (CIPP/US), Nick has managed teams focused on vulnerability management, application security, third-party risk, insider threat, incident response, privacy, and various facets of security operations.

In his spare time, Nick enjoys trail running and competing in ultra-marathons, camping, hiking, and enjoying the outdoors.


Featured Work:

Blog Posts by Nick Harrahill

What is Shadow IT: A Comprehensive Guide for Businesses

What is Shadow IT: A Comprehensive Guide for Businesses

77% of IT professionals predict that Shadow IT will become a major problem for organizations...

Avatar photo

Director of Support

Read more
How to Prevent Ransomware Attacks

How to Prevent Ransomware Attacks

There is a word that no business leader, IT admin, end-user, or stakeholder wants to...

Avatar photo

Director of Support

Read more
What You Should Know about OAuth. Authentication Fundamentals

What You Should Know about OAuth. Authentication Fundamentals

One of the fundamental aspects of authentication to end-user systems is to have the correct...

Avatar photo

Director of Support

Read more
Top New Ransomware Attacks and Threats

Top New Ransomware Attacks and Threats

Cybersecurity threats that organizations are dealing with today are showing no signs of getting easier...

Avatar photo

Director of Support

Read more
HIPAA Compliance Guide for Google Workspace™ Administrators

HIPAA Compliance Guide for Google Workspace™ Administrators

What is HIPAA? If you fall under HIPAA compliance and use Google Workspace™, is Google...

Avatar photo

Director of Support

Read more
How SpinOne Helps NIST 800-171 Compliance Requirements

How SpinOne Helps NIST 800-171 Compliance Requirements

If you supply or provide services (including consulting) for the Department of Defense, NASA, or...

Avatar photo

Director of Support

Read more
Cybersecurity Best Practices for Healthcare in 2023

Cybersecurity Best Practices for Healthcare in 2023

Over the past three years, we’ve seen multiple ransomware attacks on healthcare organizations coupled with...

Avatar photo

Director of Support

Read more
Ransomware – CISO’s worst nightmare: Detect, Block, Prevent 

Ransomware – CISO’s worst nightmare: Detect, Block, Pre...

In the first two CISO cybersecurity guides, we have taken a look at the evolving...

Avatar photo

Director of Support

Read more
SaaS Security Checklist | Best Practices to Protect SaaS Data

SaaS Security Checklist | Best Practices to Protect SaaS Data

Article Summary Protecting SaaS data requires a shared responsibility model and robust security practices. This...

Avatar photo

Director of Support

Read more
Ransomware Double Extortion: How to Protect Your SaaS Data

Ransomware Double Extortion: How to Protect Your SaaS Data

On top of just about any, cybersecurity threat list is ransomware. Ransomware continues to plague...

Avatar photo

Director of Support

Read more
How long is your SaaS downtime? What is the cost of it?

How long is your SaaS downtime? What is the cost of it?

What are the primary factors that can lead to SaaS downtime for your business? What...

Avatar photo

Director of Support

Read more
Cloud Data Security and Compliance Best Practices

Cloud Data Security and Compliance Best Practices

Securing modern technology environments has become one of the most difficult challenges for organizations protecting...

Avatar photo

Director of Support

Read more
Compliance Management Challenges in Enterprise SaaS Environments

Compliance Management Challenges in Enterprise SaaS Environments

Cloud Software-as-a-Service (SaaS) environments allow businesses today to do things that would not have been...

Avatar photo

Director of Support

Read more
How to Achieve Seamless Compliance and SaaS Security Control

How to Achieve Seamless Compliance and SaaS Security Control

Cloud Software-as-a-Service (SaaS) environments provide businesses with modern tools and cloud-centric connectivity to empower end-users....

Avatar photo

Director of Support

Read more
SaaS Security: Risk Mitigation and Management Guide

SaaS Security: Risk Mitigation and Management Guide

Business productivity generally comes down to critical applications that allow employees to interact with sanctioned...

Avatar photo

Director of Support

Read more
How to Fix SaaS Security Issues with Working Remotely

How to Fix SaaS Security Issues with Working Remotely

Since the beginning of 2020, organizations have seen a tremendous shift to a remote workforce,...

Avatar photo

Director of Support

Read more
Log Management in Cloud SaaS: Best Practices

Log Management in Cloud SaaS: Best Practices

Capturing logs is one of the most basic cybersecurity processes. Logged events from servers, firewalls,...

Avatar photo

Director of Support

Read more
The Future of Work. Increased Security Risks after COVID-19

The Future of Work. Increased Security Risks after COVID-19

Security risks spiralled with pandemics impacting many business operations. In this article, we’re taking an...

Avatar photo

Director of Support

Read more

Recognition