Despite the frequency of breaches, attackers are fairly predictable. They’re opportunists. They’ll go to where valuable data and useful identities live. Today, more than ever, that leads them to SaaS applications. This blog discusses a number of ways SaaS breaches can occur.
The digital office has moved and it seems like we’re in a constant state of catching up. The modern organization’s files, schedules, communications, concerns, plans, and goals all live in SaaS applications today. It’s easier than ever to collaborate, but it’s also easier than ever for data to leak.
The Microsoft Azure AD team has been busy building identity protection features and making them available via the Microsoft Graph REST API. Valence has been collaborating with the Azure AD team – helping to bring new capabilities to detect Risky Users and Risky Service Principals into our SaaS security platform.
Secure data sharing has historically posed significant challenges for enterprises. This blog delves into the hurdles faced by organizations governing data including legacy methods of data sharing (email attachments, file transfer software and sync & share solutions) as well as modern, cloud-based SaaS methods.
There’s a lot of focus in cybersecurity on vulnerabilities, exploits, and assets. We focus on the data that was stolen, the device that was hacked, or the malware deployed. At the center of all these incidents, however, are identities. This blog delves into identity challenges that are related to the distributed nature of SaaS applications and platforms.
SaaS applications and platforms give every user the ability to integrate new third-party vendors. The problem? Most business users don’t understand the level of access they are granting, or if the third-party can be trusted! This blog explores how security teams can get a handle on SaaS integrations.
You’ve heard a lot about Zero Trust, but did you know that most SaaS applications are well-aligned with Zero Trust Architecture? If you’re planning to start adopting Zero Trust in your organization, SaaS is an ideal place to start. This blog will help you with understand how to apply Zero Trust to SaaS, through the lens of CISA’s Zero Trust Maturity Model.