#Cybersecurity

Subscribe
Beyond Integrating AI- A Scoping Framework for Security Engineers

Beyond Integrating AI- A Scoping Framework for Security Engineers

From Consumer Apps to Custom Models: A Security Framework for AI Integration

4 min read
A New Approach to SaaS Security

A New Approach to SaaS Security

Taking a look at a new approach to securing SaaS applications with complete visibility and control.

2 min read
Understanding the OWASP Top 10

Understanding the OWASP Top 10

Understanding the OWASP key web application security risks and how to mitigate them.

4 min read
Responding to Events in the Cloud

Responding to Events in the Cloud

A framework for responding to alerts in the cloud and maintaining operational excellence.

8 min read
Access Control Gaps Lead To Data Breaches

Access Control Gaps Lead To Data Breaches

Overly permissive users lead to Salesforce data breach and the importance of SSPM solutions.

2 min read
The Anatomy of SSPM Checks

The Anatomy of SSPM Checks

Exploring the crucial components within SSPM security checks and how they secure SaaS environments.

3 min read
SaaS Termination

SaaS Termination

What to look for when you are ending a SaaS contract to maintain security and compliance.

3 min read
SaaS Vendor Security Checklist

SaaS Vendor Security Checklist

A checklist to assess SaaS vendor security during the due diligence process.

2 min read
Integrating a New System into an Existing Security Boundary

Integrating a New System into an Existing Security Boundary

Ensure a secure and compliant integration when introducing a new system into an existing security boundary.

3 min read
A Cybersecurity Program Framework

A Cybersecurity Program Framework

A reusable starting point for building a cybersecurity program using Assess, Manage, and Validate pillars.

3 min read
Software Development Life Cycle (SSDLC) in Cloud Security

Software Development Life Cycle (SSDLC) in Cloud Security

Integrating security into every phase of cloud software development with SSDLC best practices.

4 min read
Pre-commit Hooks vs. Pipeline Security Scans

Pre-commit Hooks vs. Pipeline Security Scans

Understanding the differences between pre-commit hooks and pipeline security scans in DevOps.

4 min read