Explore the latest in
industry trends, innovations and insights.
Featured
SECtember AI Think Tank Reflections: Shaping the Future of AI Security & Governance
Reco CTO and Cofounder Tal Shapiro shares insights on the transformative power of GenAI and its implications on cybersecurity from the SECtember AI Think Tank Day. Learn how AI innovators and experts came together to discuss the industry priorities for AI research and soft launch the Cloud Security Alliance’s AI Safety Initiative.


SSPM, SaaS security, artificial intelligence, AI safety, AI security, AI governance
3 min
SECtember AI Think Tank Reflections: Shaping the Future of AI Security & Governance
Reco CTO and Cofounder Tal Shapiro shares insights on the transformative power of GenAI and its implications on cybersecurity from the SECtember AI Think Tank Day. Learn how AI innovators and experts came together to discuss the industry priorities for AI research and soft launch the Cloud Security Alliance’s AI Safety Initiative.

SaaS Security, Data Exposure Prevention, Data Breach, Social Engineering
4 min
The MGM Resorts Cyber Attack: How Attackers Gained Highly Privileged Access Through Social Engineering
Learn how SaaS super admins targeted Okta in a social engineering campaign, and how to keep your Okta tenant and highly privileged SaaS identities secure using Reco’s AI-driven approach and comprehensive mapping of data, apps, and identities.

SaaS Security, SSPM, Data Exposure Prevention
5 min
Four Reasons Multi-Factor Authentication Secures SaaS Apps
SaaS apps have become prime targets for cybercriminals. To enhance security, SaaS apps are enforcing Multi-Factor Authentication (MFA) as the default setting for users. Learn four reasons why MFA is critical for organizations to secure their SaaS applications and prevent the risk of data exposure.

SaaS Security, Salesforce, SSPM
10 minutes
Video: Securing the Wild West of the Modern Enterprise
Enterprises face challenges with a lack of business context that could help them discern between potentially harmful activities and subtle indications within their SaaS applications. In this video, Reco.ai SaaS security experts discuss SaaS as the new attack surface and share recommendations for fortifying your organization's security posture.

SaaS Security, AI, App Governance
3 mins
Reimagining Contextualized SaaS Security with Generative AI
Discover how Reco.ai leverages Generative AI to revolutionize application governance and tackle the challenges of shadow applications. Learn how Reco.ai's unique 'application consolidation' process, powered by state-of-the-art Large Language Models and Google search, brings clarity to complex landscapes, enhances app governance, and uncovers unauthorized software.

SaaS Security, Cloud Security
2 mins
Empowering Cloud Security with the Combined Strength of Wiz.io & Reco.ai
Discover how Reco.ai and Wiz.io have combined their strengths to create a comprehensive cloud security solution. Benefit from enhanced visibility, control, and protection across SaaS and cloud environments with Reco.ai's contextual AI and Wiz.io's advanced security capabilities.

SaaS Security
3 Mins
Take Action on Your SaaS Security with Torq and Reco.ai
Discover Reco AI and Torq's powerful partnership offering data protection and workflow automation for SaaS-based businesses. Their innovative solution reduces exposure risk by 80%-90%, ensuring data security while streamlining operations.

SaaS Security, Salesforce Security
3 mins
Confronting The Triad of Shadow Identities, Applications, and Data
Discover how organizations can mitigate the risks posed by shadow threats such as Shadow Identities, Shadow Applications, and Shadow Data. This blog explores the importance of a comprehensive strategy supported by AI-powered SaaS security solutions, offering scalability, visibility, with effective detection and remediation. Learn how leveraging context analysis solutions enables organizations to safeguard information assets, enhance business efficiency, and foster secure collaboration.

SaaS Security, Cyber Security, Data Security, DLP, CASB, SSPM
3 min
Data Security: Life Saving, Life Supporting and Life Advancing
The impacts of data leaks not only result in the loss of critical medicines that save lives and put operators in danger, but also cause disruptions to essential systems, such as food, water, electricity, heat, and the monetary system, with significant impacts on the economy. Furthermore, they can have severe consequences for education, collaboration, the environment, and other vital aspects of modern life. In the realm of cybersecurity, cybercriminals, hackers, and ransomware gangs can do more than just damage businesses - they can destroy lives on a grand scale.

SaaS Security
4 min
Protecting Sensitive Data & Maintaining Governance In The Age of Generative AI
As a security professional, one of our key responsibilities is to implement cybersecurity solutions, policies and governance that establish guidelines and procedures for handling sensitive data. Policies and governance should empower your users with confidence in their security, rather than limiting their use of powerful Generative AI applications like ChatGPT.

SaaS Security
4 min
The Silent Enemy: Understanding & Combating Burnout In Cybersecurity
The role of cybersecurity professionals is a highly demanding one. CISOs, CIOs, CSOs, Security analysts, Compliance Officers, and many others are responsible for safeguarding sensitive information and critical systems from cyber threats such as hackers, hacktivists, and even nation-states.

SaaS Security, Salesforce Security
4 min
The Future of SaaS Security is Here: Intelligent SSPM to Safeguard Your Sensitive Data
The convenience of using SaaS-based storage services like Google Drive has revolutionized the way we store and share files. However, with this convenience comes the risk of inadvertently exposing sensitive information to the public. For example, if someone shares a file or folder with the wrong person or forgets to restrict access to sensitive information, it could end up being publicly accessible.

SaaS Security
4 min
SSPM: A Partial Solution to Protecting Data in the Era of SaaS Collaboration
The explosion in SaaS collaboration tools adoption such as Slack, Microsoft 365 or Google Workspace, GitHub, has forced significant changes in how organizations operate, leading to on-going digital transformations. Traditional data security protocols and solutions are rigid, relying entirely on one-dimensional rules that don’t take into account the vast reams of unstructured data flowing to both internal and external users.

SaaS Security
4 min
From Conflict to Collaboration: Balancing Business Agility, Productivity, and Security with AI and Organizational Context
A recent article, “Negotiating With Internal Security Teams,” addressed the frustrations tech teams face when collaborating with their internal security counterparts. To overcome these challenges and achieve a balance between employee productivity and information security, organizations must adopt a business-context-based security approach.

SaaS Security
4 min
Cloudy With a Chance of Intrusion: Overcoming Data Security Hurdles Across SaaS Applications
Securing data is crucial in cloud computing and across any SaaS application, as the data stored within these platforms are often sensitive and valuable. It is imperative that all parties involved, including SaaS providers, businesses, and their security teams, take responsibility for safeguarding these applications and their data.

SaaS Security
4 min
Protecting Your SaaS Data When Employees Leave
A key challenge around SaaS data security is the risk of data loss when an employee leaves the organization. This is because when an employee leaves an organization, they may take sensitive data with them or cause damage to company data either intentionally or unintentionally.

SaaS Security
4 min
Sensitive SaaS Data: Managing Access To It
Canalys, a technology market analysis firm, estimated that more than 30 billion data records were stolen in 2020, more than in the previous 15 years combined and the FBI has reported that the number of cyberattacks is doubling. This trend is only going to grow in the years to come, so ensuring your data is protected by tackling where it is and who is accessing it is critical.

SaaS Security
4 min
Real Life Challenges: Finding Your Sensitive SaaS Data
More than 80% of workers use collaboration tools, up 44% since the start of the pandemic. While this rapid increase has improved workplace efficiency, it's also opened organizations up to greater data security threats and headaches due to the massive amounts of sensitive data at play.

Phishing, SaaS Security
4 min
Same Tricks, Different Methods – Phishing Via SaaS!
Adversaries are crafting better messages, going through deeper investigations to craft more targeted attacks, and using phishing kits to spread these attacks across organizations. It would appear fraudsters and cybercriminals behind the various tactics to fool and deceive never rest and now are looking to exploit SaaS based tools.

SaaS Security, Salesforce Security
4 min
Democratizing the Principle of Least Privilege in Collaboration Tools
Securing data in collaboration tools centers around understanding of the principle of least privilege across the organization. But the decentralized nature of collaboration tools challenges traditional privilege management, and a new solution is needed to democratize how privileges are assigned and abuses remediated.

SaaS Security
4 min
Google’s Data Protection Insights for Drive: Great Idea, Poor Execution
We recently received a headline from Google: 46% of potentially sensitive files have been shared outside your organization. Part of Google’s data protection insights for Drive, this alert and indeed the report, and the entire initiative, is missing an important ingredient: Context.

SaaS Security
4 min
Figma vulnerability: Slack Preview Gives Unauthorized View of Project Contents
A recently discovered vulnerability in the Figma integration in Slack potentially leaks information contained in Figma files to unauthorized users in the preview thumbnail. This vulnerability has been reported to Figma for them to manage. We are reporting our findings in accordance with the principles of responsible disclosure.

Identity, SaaS Security
5 min
One GIFShell to Rule Them All: How To Detect An Attack
Last month, security researcher Bobby Rauch published two blogs revealing a new vulnerability in Microsoft Teams. Known as GIFShell, the vulnerability utilizes seven different insecure design elements within Microsoft Teams to create the situation whereby an attacker can launch an exfiltration or malware attack against a victim – simply by sending them a GIF with embedded commands in a Teams chat.

Identity, SaaS Security
5 min
Mind the Gap: Connecting Identity with Data Security
Collaboration tools have made it easier to work with each other both within and outside the organization. But as the number of collaboration tools in use increases, how can you be sure that you know the identity of all users and what they are legitimately allowed to do with your data?

SaaS Security
4 min
How to Protect Against Data Loss in Collaboration Tools
Preventing data loss has taken on a new meaning in today’s world where collaboration takes place in moments, not meetings. Reco’s solution is designed to help organizations prevent data loss from the collaboration tools that keep them moving.

SaaS Security
4 min
Secure Collaboration Tools Without Disrupting Business
In the old world collaboration tools were in place to create quicker workflows and security tools were seen as a blocker. In the new world of collaboration security the two are not contradictory and security is an enabler rather than a barrier.

SaaS Security, SSPM, Data Exposure Management
4 min
Cresta Leverages Reco to Prevent Data Exposure
Discover how Reco’s AI-driven approach and comprehensive mapping of data, apps, and identities perfectly aligned with the needs of our customer, Cresta. By going beyond security posture, Reco enabled proactive detection and response to sensitive data exposure and leakage.

SaaS Security, Productivity
4 min
Solaredge + Reco
Reco.ai has empowered Solaredge to enhance their SaaS security and productivity exponentially. By providing comprehensive visibility, reducing false positives, and streamlining the protection of sensitive data, Reco.ai has proven instrumental in Solaredge's pursuit of securing their intellectual property, maintaining data privacy, and achieving operational excellence.

Identity, Use Case, SaaS Security
5 min
Reco Visibility and Detection Reduces Employee Insider Threat – Before It Goes Too Far
Current ways of working, with remote working, and increased use of collaboration tools have increased the potential of employee insider threats. Reco’s collaboration security platform is designed to avoid situations where an employee uses anything from sanctioned work collaboration tools to shadow IT to leak sensitive work documents.

SaaS Security
4 min
Introducing Reco: The Collaboration Security Tool of the Future
We introduce Reco, a collaboration security tool designed to support organizations to keep working together without compromising on security. Learn more about how Reco is revolutionizing collaboration security for enterprises.

News
4 min