Explore the latest in industry trends, innovations and insights.
Featured
Confronting The Triad of Shadow Identities, Applications, and Data
Discover how organizations can mitigate the risks posed by shadow threats such as Shadow Identities, Shadow Applications, and Shadow Data. This blog explores the importance of a comprehensive strategy supported by AI-powered SaaS security solutions, offering scalability, visibility, with effective detection and remediation. Learn how leveraging context analysis solutions enables organizations to safeguard information assets, enhance business efficiency, and foster secure collaboration.


SaaS Security
3 mins
Confronting The Triad of Shadow Identities, Applications, and Data
Discover how organizations can mitigate the risks posed by shadow threats such as Shadow Identities, Shadow Applications, and Shadow Data. This blog explores the importance of a comprehensive strategy supported by AI-powered SaaS security solutions, offering scalability, visibility, with effective detection and remediation. Learn how leveraging context analysis solutions enables organizations to safeguard information assets, enhance business efficiency, and foster secure collaboration.

saas security cyber security data security DLP CASB SSPM
3 min
Data Security: Life Saving, Life Supporting and Life Advancing
The impacts of data leaks not only result in the loss of critical medicines that save lives and put operators in danger, but also cause disruptions to essential systems, such as food, water, electricity, heat, and the monetary system, with significant impacts on the economy. Furthermore, they can have severe consequences for education, collaboration, the environment, and other vital aspects of modern life. In the realm of cybersecurity, cybercriminals, hackers, and ransomware gangs can do more than just damage businesses - they can destroy lives on a grand scale.

SaaS Security
4 min
Protecting Sensitive Data & Maintaining Governance In The Age of Generative AI
As a security professional, one of our key responsibilities is to implement cybersecurity solutions, policies and governance that establish guidelines and procedures for handling sensitive data. Policies and governance should empower your users with confidence in their security, rather than limiting their use of powerful Generative AI applications like ChatGPT.

SaaS Security
4 min
The Silent Enemy: Understanding & Combating Burnout In Cybersecurity
The role of cybersecurity professionals is a highly demanding one. CISOs, CIOs, CSOs, Security analysts, Compliance Officers, and many others are responsible for safeguarding sensitive information and critical systems from cyber threats such as hackers, hacktivists, and even nation-states.

SaaS Security
4 min
The Future of SaaS Security is Here: Intelligent SSPM to Safeguard Your Sensitive Data
The convenience of using SaaS-based storage services like Google Drive has revolutionized the way we store and share files. However, with this convenience comes the risk of inadvertently exposing sensitive information to the public. For example, if someone shares a file or folder with the wrong person or forgets to restrict access to sensitive information, it could end up being publicly accessible.

SaaS Security
4 min
SSPM: A Partial Solution to Protecting Data in the Era of SaaS Collaboration
The explosion in SaaS collaboration tools adoption such as Slack, Microsoft 365 or Google Workspace, GitHub, has forced significant changes in how organizations operate, leading to on-going digital transformations. Traditional data security protocols and solutions are rigid, relying entirely on one-dimensional rules that don’t take into account the vast reams of unstructured data flowing to both internal and external users.

SaaS Security
4 min
From Conflict to Collaboration: Balancing Business Agility, Productivity, and Security with AI and Organizational Context
A recent article, “Negotiating With Internal Security Teams,” addressed the frustrations tech teams face when collaborating with their internal security counterparts. To overcome these challenges and achieve a balance between employee productivity and information security, organizations must adopt a business-context-based security approach.

SaaS Security
4 min
Cloudy With a Chance of Intrusion: Overcoming Data Security Hurdles Across SaaS Applications
Securing data is crucial in cloud computing and across any SaaS application, as the data stored within these platforms are often sensitive and valuable. It is imperative that all parties involved, including SaaS providers, businesses, and their security teams, take responsibility for safeguarding these applications and their data.

SaaS Security
4 min
Protecting Your SaaS Data When Employees Leave
A key challenge around SaaS data security is the risk of data loss when an employee leaves the organization. This is because when an employee leaves an organization, they may take sensitive data with them or cause damage to company data either intentionally or unintentionally.

SaaS Security
4 min
Sensitive SaaS Data: Managing Access To It
Canalys, a technology market analysis firm, estimated that more than 30 billion data records were stolen in 2020, more than in the previous 15 years combined and the FBI has reported that the number of cyberattacks is doubling. This trend is only going to grow in the years to come, so ensuring your data is protected by tackling where it is and who is accessing it is critical.

SaaS Security
4 min
Real Life Challenges: Finding Your Sensitive SaaS Data
More than 80% of workers use collaboration tools, up 44% since the start of the pandemic. While this rapid increase has improved workplace efficiency, it's also opened organizations up to greater data security threats and headaches due to the massive amounts of sensitive data at play.

Phishing, SaaS Security
4 min
Same Tricks, Different Methods – Phishing Via SaaS!
Adversaries are crafting better messages, going through deeper investigations to craft more targeted attacks, and using phishing kits to spread these attacks across organizations. It would appear fraudsters and cybercriminals behind the various tactics to fool and deceive never rest and now are looking to exploit SaaS based tools.

SaaS Security
4 min
Democratizing the Principle of Least Privilege in Collaboration Tools
Securing data in collaboration tools centers around understanding of the principle of least privilege across the organization. But the decentralized nature of collaboration tools challenges traditional privilege management, and a new solution is needed to democratize how privileges are assigned and abuses remediated.

SaaS Security
4 min
Google’s Data Protection Insights for Drive: Great Idea, Poor Execution
We recently received a headline from Google: 46% of potentially sensitive files have been shared outside your organization. Part of Google’s data protection insights for Drive, this alert and indeed the report, and the entire initiative, is missing an important ingredient: Context.

SaaS Security
4 min
Figma vulnerability: Slack Preview Gives Unauthorized View of Project Contents
A recently discovered vulnerability in the Figma integration in Slack potentially leaks information contained in Figma files to unauthorized users in the preview thumbnail. This vulnerability has been reported to Figma for them to manage. We are reporting our findings in accordance with the principles of responsible disclosure.

Identity, SaaS Security
5 min
One GIFShell to Rule Them All: How To Detect An Attack
Last month, security researcher Bobby Rauch published two blogs revealing a new vulnerability in Microsoft Teams. Known as GIFShell, the vulnerability utilizes seven different insecure design elements within Microsoft Teams to create the situation whereby an attacker can launch an exfiltration or malware attack against a victim – simply by sending them a GIF with embedded commands in a Teams chat.

Identity, SaaS Security
5 min
Mind the Gap: Connecting Identity with Data Security
Collaboration tools have made it easier to work with each other both within and outside the organization. But as the number of collaboration tools in use increases, how can you be sure that you know the identity of all users and what they are legitimately allowed to do with your data?

SaaS Security
4 min
How to Protect Against Data Loss in Collaboration Tools
Preventing data loss has taken on a new meaning in today’s world where collaboration takes place in moments, not meetings. Reco’s solution is designed to help organizations prevent data loss from the collaboration tools that keep them moving.

SaaS Security
4 min
Secure Collaboration Tools Without Disrupting Business
In the old world collaboration tools were in place to create quicker workflows and security tools were seen as a blocker. In the new world of collaboration security the two are not contradictory and security is an enabler rather than a barrier.

SaaS Security, Productivity
4 min
Solaredge + Reco
Reco.ai has empowered Solaredge to enhance their SaaS security and productivity exponentially. By providing comprehensive visibility, reducing false positives, and streamlining the protection of sensitive data, Reco.ai has proven instrumental in Solaredge's pursuit of securing their intellectual property, maintaining data privacy, and achieving operational excellence.

Identity, Use Case, SaaS Security
5 min
Reco Visibility and Detection Reduces Employee Insider Threat – Before It Goes Too Far
Current ways of working, with remote working, and increased use of collaboration tools have increased the potential of employee insider threats. Reco’s collaboration security platform is designed to avoid situations where an employee uses anything from sanctioned work collaboration tools to shadow IT to leak sensitive work documents.

SaaS Security
4 min
Introducing Reco: The Collaboration Security Tool of the Future
We introduce Reco, a collaboration security tool designed to support organizations to keep working together without compromising on security. Learn more about how Reco is revolutionizing collaboration security for enterprises.

News
4 min