Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common mi… Continue reading Who handles what? Common misconceptions about SaaS security responsibilities

How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring softwa… Continue reading How to choose secure, verifiable technologies?

Why companies are struggling to keep up with SaaS data protection

While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents expressed… Continue reading Why companies are struggling to keep up with SaaS data protection

The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and reme… Continue reading The case for enterprise exposure management

Human firewalls are essential to keeping SaaS environments safe

Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, Jira, Zendesk and others. We recently surveyed security leaders and CISOs on … Continue reading Human firewalls are essential to keeping SaaS environments safe

A third of organizations suffered a SaaS data breach this year

While SaaS security is finally getting the attention it deserves, there’s still a significant gap between intent and implementation. Ad hoc strategies and other practices still fall short of a security program. The move toward decentralization has gene… Continue reading A third of organizations suffered a SaaS data breach this year

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team.
The post When Convenience Costs: CISOs Struggle With SaaS Securit… Continue reading When Convenience Costs: CISOs Struggle With SaaS Security Oversight