request a demo
Solution
Solution
By Use Case
All Use Cases
SaaS Misconfiguration Management
Identity & Access Governance
SaaS-to-Saas Access and Discovery
Device-to-SaaS Risk Management
Identity Threat Detection & Response
By Category
What is SSPM?
SSPM vs. CSPM
SSPM vs. CASB
Get in touch
See a Demo
The Ultimate SaaS Security Posture Management Checklist 2023
Download
Platform
Platform
Features and Functionalities
All Features
Saas Posture by Domain
SaaS Posture by Application
SaaS Compliance Frameworks
SaaS Security Checks
Alerts
Remediation
User Inventory
3rd Party App Inventory
Device Inventory
Activity Monitoring
Posture Over Time
Role Based Access Control
Integrations
All Supported Applications
R&D
BI & Analytics
Collaboration & Communication
HR, Finance & Legal
IT & Security
Sales & Marketing
Unified Endpoint Management Integrations
Get in touch
See a Demo
Download the Solution Brief: SaaS Security Posture Management
Get Solution Brief
Resources
Resources
Library
All Resources
Whitepapers & Reports
Webinars & Videos
Analyst Reports
Solution Briefs / Datasheets
Blog
All Blogs
SaaS Security
Compliance
Research
Company News
Recaps & Spotlights
Use Cases
Benchmarks for SaaS Apps
SaaS in the real world
Breach Debrief
The Ultimate SaaS Security Posture Management Checklist 2023
Download
The Ultimate SaaS Security Posture Management Checklist 2023
Download
Partners
Partners
Partners
Business Partners
Tech Partners
Partner Portal
Partners
Partner with Adaptive Shield and become
part of our partner ecosystem
Partner with Us
Company
Company
Company
About Us
News
Events
Careers
Company
Learn all about life at Adaptive Shield
Explore Our Opportunities
Follow Us
request a demo
Home
Platform
Resources
Company
About us
News & Events
Careers
Contact Us
Request a Demo
New Cloud Security Alliance Survey Finds SaaS Security Has Become a Top Priority for 80% of Organizations
The attack surface in the SaaS ecosystem is widening and organizations need to know how to secure their SaaS data.
New Cloud Security Alliance Survey Finds SaaS Security Has Become a Top Priority for 80% of Organizations
The attack surface in the SaaS ecosystem is widening and organizations need to know how to secure their SaaS data.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filter By:
All
SaaS Security
Compliance
Research
Company News
Recaps & Spotlights
Use Cases
Benchmarks for SaaS Apps
SaaS in the Real World
Breach Debrief
Adaptive Shield Strengthens Security Posture with New Certifications
In addition to being ISO 27001 certified and GDPR compliant, Adaptive Shield ensures highest global standards with new ISO 27701 (privacy) and SOC 2 Type II (security) certifications.
Read more
Adaptive Shield Team
●
May 29, 2023
Adaptive Shield Team
●
May 29, 2023
Benchmarks for SaaS Apps: Password Management
Password policy and protocol settings prevent unauthorized visitors from accessing your SaaS. How do SaaS configurations measure up?
Read more
Adaptive Shield Team
●
May 23, 2023
Adaptive Shield Team
●
May 23, 2023
Why Telecoms Struggle with SaaS Security
Telecom companies are facing challenges when it comes to securing their SaaS applications. This is due to the complexity of the SaaS model and the fact that telecom companies are not always equipped to handle the unique security requirements of SaaS.
Read more
Arye Zacks
●
May 16, 2023
Arye Zacks
●
May 16, 2023
Benchmarks for SaaS App: Malware Protection
Most people don’t realize SaaS apps can be carriers for malware. How do your malware protection settings compare?
Read more
Adaptive Shield Team
●
May 8, 2023
Adaptive Shield Team
●
May 8, 2023
Breach Debrief Series: Salesforce Community Sites
Several organizations, including banks and healthcare providers, have had their data leaked as a result of a misconfiguration in Salesforce Communities. Unfortunately, this is not a one-off event. This post will cover the leak as well as best practices to secure your Salesforce Community.
Read more
Hananel Livneh
●
May 4, 2023
Hananel Livneh
●
May 4, 2023
Benchmarks for SaaS Apps: Data Leakage Protection
Data leakage protection protects your data from unauthorized viewers. How do SaaS configurations measure up?
Read more
Adaptive Shield Team
●
April 24, 2023
Adaptive Shield Team
●
April 24, 2023
CASB vs SSPM
CASBs and SSPM are complementary solutions, however, they each focus on different aspects of SaaS data security. This blog will dive into the key differences between the two solutions and how CASB and SSPM can work together to create a consolidated SaaS security program.
Read more
Adaptive Shield Team
●
April 20, 2023
Adaptive Shield Team
●
April 20, 2023
What's the Difference Between CSPM & SSPM?
Better understand the difference between CSPM and SSPM and the value derived from each solution.
Read more
Adaptive Shield Team
●
April 17, 2023
Adaptive Shield Team
●
April 17, 2023
Benchmarks for SaaS Apps: Access Control
Access Control has the highest impact on your company’s SaaS security posture. How do your SaaS configurations compare?
Read more
Adaptive Shield Team
●
April 12, 2023
Adaptive Shield Team
●
April 12, 2023
Benchmarks for SaaS Apps: A Guide to Measure Your Company’s SaaS Baselines & Risk
In our Benchmarks for SaaS Apps series, we’ll share benchmark data for five high-impact security domains.
Read more
Adaptive Shield Team
●
April 11, 2023
Adaptive Shield Team
●
April 11, 2023
Think Before You Share the Link: SaaS in the Real World
There are essentially two ways to share files and documents out of a SaaS application: Make the resource available to specific users or make it available to "anyone with a link". Many users think that the latter is far more convenient, but the truth is that it opens organizations to significant risk.
Read more
Arye Zacks
●
April 3, 2023
Arye Zacks
●
April 3, 2023
Top 7 SaaS Security Activities at RSA 2023
The RSA conference is back for 2023 and there is a lot happening but only so many hours in the day. That's why we have gathered a list of the top 7 activities for the SaaS security aficionados to hit at RSA 2023.
Read more
Zehava Musahanov
●
March 27, 2023
Zehava Musahanov
●
March 27, 2023
SaaS Rootkit Exploits Hidden Rules in Microsoft 365
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
Read more
Maor Bin
●
March 21, 2023
Maor Bin
●
March 21, 2023
How to Apply NIST Principles to SaaS in 2023
NIST is considered a leading authority in the field of global cybersecurity standards. Understanding how to set these standards for your SaaS ecosystem security may be challenging but is crucial.
Read more
Arye Zacks
●
March 13, 2023
Arye Zacks
●
March 13, 2023
Shocking Findings from the 2023 Third-Party App Access Report
Dive into the 5 key findings from the new SaaS-to-SaaS Access Report, Uncovering the Risks & Realities of Third-Party Connected Apps.
Read more
Eliana Vuijsje
●
March 8, 2023
Eliana Vuijsje
●
March 8, 2023
Granting 3rd-Party Apps Access to Microsoft 365 and Google Workspace Presents Major Security Risks, According to Adaptive Shield Report
Our new report takes a look at the how volume of applications being connected to the SaaS stack and the risk they represent to company data.
Read more
Adaptive Shield Team
●
February 27, 2023
Adaptive Shield Team
●
February 27, 2023
SaaS in the Real World: Who’s Responsible to Secure This Data
When SaaS apps first grew in popularity, it wasn't clear who was responsible for securing the data/ Nowadays, most security and IT teams are aware of the shared responsibility model, where the provider is responsible for the app and the organization is responsible for the data. The bigger question today is where does the data responsibility lies on the organization's side?
Read more
Arye Zacks
●
February 20, 2023
Arye Zacks
●
February 20, 2023
What Are the Cyber Risks with SaaS?
Oftentimes, security teams assume that data stored within SaaS apps is less sensitive than other corporate IP and accept that the security tools built into the SaaS app are strong enough to provide adequate protection. This assumption, however, is leaving critical data exposed online, putting organizations at risk of data exposure, ransomware, and regulatory fines.
Read more
Arye Zacks
●
February 13, 2023
Arye Zacks
●
February 13, 2023
Adaptive Shield Partners with Datadog for Seamless SaaS Security Management
Adaptive Shield has partnered with Datadog, the observability service for cloud-scale applications, to provide joint customers with the ability to stream and visualize SaaS security alerts from Adaptive Shield.
Read more
Adaptive Shield Team
●
February 8, 2023
Adaptive Shield Team
●
February 8, 2023
SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric
The move to SaaS and other cloud tools has put an emphasis on Identity & Access Management (IAM), and the tools used to define IAM make up its identity fabric. Unfortunately, these tools are being pushed to their limits due to decentralized IT, evolving threats, and zero-trust tools. An SSPM solution helps add a layer to an organization's identity fabric by enabling continuous monitoring and suspicious behavior alerts.
Read more
Arye Zacks
●
January 30, 2023
Arye Zacks
●
January 30, 2023
Why Do User Permissions Matter for SaaS Security?
User permissions are considered a headache to configure by both admins and users, but they remain crucial to protect organizations from both external attacks and internal data-sharing errors.
Read more
Arye Zacks
●
January 23, 2023
Arye Zacks
●
January 23, 2023
Breach Debrief Series: Nissan North America
Nissan North America security incident affected almost 18,000 customers. Read all about the breach and how to protect your organization from one like it.
Read more
Hananel Livneh
●
January 18, 2023
Hananel Livneh
●
January 18, 2023
100 Apps, Endless Security Checks
With an average of 100 apps being used, the average security team is flying blind without visibility and control over a critical mass of their organization’s entire SaaS app stack. It’s important that all SaaS apps be managed at scale, which is why organizations need a solution that offers both comprehensive checks and breadth of app coverage.
Read more
Adaptive Shield Team
●
January 16, 2023
Adaptive Shield Team
●
January 16, 2023
SaaS in the Real World: User Access After Downsizing
Over the last year, we’ve seen increasing evidence of an upcoming recession. While no one knows exactly what 2023 will bring to the labor market, organizations need to be prepared for potential downsizing.
Read more
Arye Zacks
●
January 9, 2023
Arye Zacks
●
January 9, 2023
Slack GitHub Breach: How It Happened and How You Can Protect Your Repository
Over the holiday weekend, Slack detected a breach after noticing suspicious activity, and in their investigation found that stolen Slack employee tokens were the source of the breach. This is one of many examples that shows how crucial it is for organizations to secure their repositories.
Read more
Hananel Livneh
●
January 5, 2023
Hananel Livneh
●
January 5, 2023
SaaS in the Real World: M&A Due Diligence
As executives are planning an acquisition or divestiture within the next 12-18 months, M&A due diligence is key to business resurgence, strategic growth, and capability expansion. Unfortunately, one area that’s often overlooked during M&A due diligence is a target company’s SaaS landscape.
Read more
Arye Zacks
●
January 4, 2023
Arye Zacks
●
January 4, 2023
Keeping SaaS Apps HIPAA Compliant
Healthcare organizations have been cautious in moving toward cloud technologies and SaaS applications. However, as the industry begins to shift and embraces the cloud, healthcare security professionals need to understand how SaaS security impacts their Health Insurance Portability and Accessibility Act (HIPAA) compliance posture.
Read more
Adaptive Shield Team
●
December 27, 2022
Adaptive Shield Team
●
December 27, 2022
Top 4 SaaS Security Threats for 2023
This past year has seen its fair share of breaches, attacks, and leaks, forcing organizations to scramble to protect their SaaS stacks. With SaaS sprawl ever growing and becoming more complex, organizations can look to four areas within their SaaS environment to harden and secure.
Read more
Zehava Musahanov
●
December 19, 2022
Zehava Musahanov
●
December 19, 2022
What is SSPM?
Gartner named SaaS Security Posture Management (SSPM) as a must-have solution in the “4 Must-Have Technologies That Made the Gartner Hype Cycle for Cloud Security, 2021”. Read about why having an SSPM is important and it's benefits.
Read more
Eliana Vuijsje
●
December 15, 2022
Eliana Vuijsje
●
December 15, 2022
Webinar Spotlight: Pinpoint Your SaaS App Risks from Evaluation to Usage
A recap of a webinar with our CEO Maor Bin and Panorays's CTO Demi Ben Ari, where they discuss how to pinpoint your SaaS app risks from evaluation to usage.
Read more
Zehava Musahanov
●
December 5, 2022
Zehava Musahanov
●
December 5, 2022
Adaptive Shield Releases SaaS-to-SaaS Capabilities to Minimize Supply Chain Risks
The expansion of our SSPM platform enables security teams to discover and manage all SaaS apps connected to the core SaaS stack.
Read more
Adaptive Shield Team
●
November 30, 2022
Adaptive Shield Team
●
November 30, 2022
Key Takeaways from Forrester’s Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management Report
Forrester interviews customers across different organizations who have implemented an SSPM solution Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management report. This blog will discuss the key takeaways from the report.
Read more
Zehava Musahanov
●
November 23, 2022
Zehava Musahanov
●
November 23, 2022
Use Case Series: Identity and Access Management Governance
Every SaaS app user and login is a potential threat, which is why identity and access management (IAM) is crucial for a strong SaaS security posture. However, it is IAM Governance that enables the security team to act upon arising issues by providing constant monitoring of the company’s SaaS Security posture as well as its implementation of access control.
Read more
Zehava Musahanov
●
November 16, 2022
Zehava Musahanov
●
November 16, 2022
Adaptive Shield Announces 100 SaaS App Integrations for Comprehensive SaaS Security
Groundbreaking number of integrations within the company’s SSPM platform enables security teams to easily integrate, monitor and mitigate risk across their SaaS stack.
Read more
Adaptive Shield Team
●
November 9, 2022
Adaptive Shield Team
●
November 9, 2022
Not All Sandboxes Are for Children: How to Secure Your SaaS Sandbox
When creating a Sandbox, the mindset tends to be that the Sandbox will have no effect on the production or operational system. This mindset is not only wrong, but extremely dangerous. This article will walk you through what is a SaaS sandbox, why it is vulnerable, and how to secure it.
Read more
Hananel Livneh
●
October 25, 2022
Hananel Livneh
●
October 25, 2022
Webinar Spotlight: SaaS Security Trends, Challenges, and Solutions for 2022
The highlights from our SaaS Security Trends, Challenges and Solutions for 2022 webinar, led by our CEO Maor Bin and Okta VP of Strategy Stephen Lee.
Read more
Zehava Musahanov
●
October 19, 2022
Zehava Musahanov
●
October 19, 2022
The Ultimate SaaS Security Posture Management Checklist, 2023 Edition
It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If SSPM is on your radar, the 2023 checklist edition covers the critical features and capabilities when evaluating a solution.
Read more
Eliana Vuijsje
●
October 12, 2022
Eliana Vuijsje
●
October 12, 2022
Ensuring SaaS Security in ISO Compliance
The International Organization for Standardization (ISO) sets standards across various industries. ISO 27000:2018 and ISO 27001:2013 can be used to help build out a strong security posture. Read more to understand the two recent yet different versions of ISO compliance standards and how SSPM can help security teams ensure ISO compliance.
Read more
Adaptive Shield Team
●
September 28, 2022
Adaptive Shield Team
●
September 28, 2022
Who Has Control: The SaaS App Admin Paradox
Security teams are responsible for securing the organizations' SaaS app stack but they can't execute this task without full control of the SaaS app of which up to 40% are owned by business departments.
Read more
Eliana Vuijsje
●
September 20, 2022
Eliana Vuijsje
●
September 20, 2022
Adaptive Shield and Tenable Partner to Enhance SaaS Security Posture
Adaptive Shield partners with Tenable, the Cyber Exposure Management company, to provide a consolidated posture management solution that correlates the risk of SaaS users and their endpoints.
Read more
Adaptive Shield Team
●
September 14, 2022
Adaptive Shield Team
●
September 14, 2022
GIFShell Attack Through Microsoft Teams: What Is It and How You Can Protect Yourself from It
A deep dive into the recently discovered GIFShell attack technique, which enables bad actors to exploit several Microsoft Teams features to act as a C&C for malware, and the best practices to protect against it.
Read more
Shir Hishman
●
September 13, 2022
Shir Hishman
●
September 13, 2022
Misconfigurations 101: The Three V’s of SaaS App Configurations Weaknesses
The ease with which SaaS apps can be deployed and adopted is remarkable, but it has quickly become a double-edged sword. On one hand, the availability of SaaS tools enables employees to work from anywhere. For IT and security teams however, the adoption of SaaS apps has become a daunting endeavor. Misconfigurations are brought on by many different factors, the top three can be summed up into the three V’s.
Read more
Adaptive Shield Team
●
September 8, 2022
Adaptive Shield Team
●
September 8, 2022
The Next Trends In SaaS Security
As the investment in SaaS apps continues, new critical SaaS challenges emerge beyond the classic use case of misconfiguration and user permissions management, such as SaaS-to-SaaS access and device-to-SaaS-user posture management. This blog will give a brief overview of the trends in SaaS security.
Read more
Maor Bin
●
August 16, 2022
Maor Bin
●
August 16, 2022
SaaS Security Use Case Series: Device-to-SaaS User Risk
Employees now use their personal devices, whether their phone or personal laptop, etc. to get their jobs done. If the device’s hygiene is not up to par, it increases the SaaS app attack surface for bad actors. Read more to find out how to combat these risks.
Read more
Eliana Vuijsje
●
August 11, 2022
Eliana Vuijsje
●
August 11, 2022
SaaS Security Use Case Series: SaaS-to-SaaS Access
When SaaS platforms ask for permissions' access, they are usually granted without a second thought, not realizing that these addition connections present more opportunities for bad actors to gain access to their company's data. Read all about the SaaS-to-SaaS connection process and how to combat its risks.
Read more
Eliana Vuijsje
●
August 8, 2022
Eliana Vuijsje
●
August 8, 2022
What It Takes to Tackle Your SaaS Security
It’s not a new concept that Office 365, Salesforce, Slack, Google Workspace or Zoom, etc. are amazing for enabling the hybrid workforce and hyper productivity in businesses today. However, there are three main challenges that have arisen stemming from this evolution.
Read more
Eliana Vuijsje
●
July 26, 2022
Eliana Vuijsje
●
July 26, 2022
Adaptive Shield Selected as SC Media Trust Award Finalist for Best Cloud Security Posture Management Solution
Adaptive Shield has been recognized as a Trust Award finalist in the Best Cloud Security Posture Management Solution category for the 2022 SC Awards.
Read more
Adaptive Shield Team
●
July 6, 2022
Adaptive Shield Team
●
July 6, 2022
Omdia’s On the Radar Report Covers Adaptive Shield's SSPM Solution
Adaptive Shield is officially On the Radar in Omdia's report for an innovative solution making a big impact in the SaaS security space.
Read more
Zehava Musahanov
●
June 29, 2022
Zehava Musahanov
●
June 29, 2022
Top 5 Configurations to Check When Setting Up a New SaaS App
The old days of buying new software, installing it on the company servers, and making sure everything works is gone - all hail the new IT king, SaaS apps. Yet the ease of connection should not create a false sense of security. Every SaaS platform’s settings need to be hardened to protect the company's assets. This blog post aims to ease that burden by providing a basic SaaS security checklist to make sure the basics are covered.
Read more
Hananel Livneh
●
June 21, 2022
Hananel Livneh
●
June 21, 2022
RSA 2022 Recap
After 2 years of virtual events, RSA Conference 2022 in San Francisco brought back face-to-face interaction. And wow, what an experience! From live sessions and parties to games and demos galore, RSA was packed with it all. Here’s a recap of Adaptive Shield at RSA.
Read more
Adaptive Shield Team
●
June 15, 2022
Adaptive Shield Team
●
June 15, 2022
Best Practices for an SSPM Solution to Help You Secure Your SaaS App Stack
The SaaS app attack surface has widened and recent research shows that up to 63 percent of organizations have dealt with security incidents because of a SaaS misconfiguration. Here are some of the best practices for an SSPM solution to help you secure your SaaS app stack.
Read more
Zehava Musahanov
●
June 7, 2022
Zehava Musahanov
●
June 7, 2022
Manual vs. SSPM: Research on What Streamlines SaaS Security Detection & Remediation
When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report.
Read more
Zehava Musahanov
●
May 31, 2022
Zehava Musahanov
●
May 31, 2022
Top 13 Cloud and SaaS Security Talks at RSA 2022
Every year the leaders and entrepreneurs of the cybersecurity world come together for four days for the annual RSA Conference. Finally, after many years of the event being virtual, RSA is back in its physical form. This year's conference will feature numerous presentations from industry leaders offering unique insights and fresh perspectives on the world of cloud and SaaS security. We have gathered a list of the 13 top talks taking place at RSA 2022.
Read more
Adaptive Shield Team
●
May 18, 2022
Adaptive Shield Team
●
May 18, 2022
SSPM Solving the SaaS Security Challenge of “Too Much to Do, Too Little Time”
A recap of a webinar with our CEO, Maor Bin and Omdia Senior Principal Analyst, Rik Turner discussing how SSPM is solving the SaaS security challenge of "too much to do, too little time".
Read more
Zehava Musahanov
●
May 11, 2022
Zehava Musahanov
●
May 11, 2022
7 Significant Findings from the 2022 SaaS Security Survey Report
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security professionals in today’s enterprises.
Read more
Eliana Vuijsje
●
May 3, 2022
Eliana Vuijsje
●
May 3, 2022
Adaptive Shield Recognized as a 2022 Gartner® Cool Vendors™
We are excited to announce that Gartner has named us a 2022 Gartner Cool Vendors™ in Application Security: Protection of Cloud-Native Applications. Read more to get all the details.
Read more
Adaptive Shield Team
●
April 26, 2022
Adaptive Shield Team
●
April 26, 2022
Into the Breach: Breaking Down 3 SaaS App Attacks in 2022
During the last week of March, three major tech companies - Microsoft, Okta, and HubSpot - reported significant data breaches. This blog will review the three breaches based on publicly disclosed information and suggest best practices to minimize the risk of such attacks succeeding against your organization.
Read more
Hananel Livneh
●
April 20, 2022
Hananel Livneh
●
April 20, 2022
New 2022 SaaS Security Survey Report Shines a Light on CISOs' Perspectives for Today's Enterprises
To better understand how teams are dealing with their SaaS security posture, Adaptive Shield partnered with the leading organization dedicated to promoting best practices for ensuring cyber security, Cloud Security Alliance (CSA), to develop the 2022 SaaS Security Survey Report.
Read more
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Partners With CrowdStrike to Introduce Zero Trust SaaS Security Posture Solution to CrowdStrike Store
Adaptive Shield partners with CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, to introduce a new Zero Trust SaaS Security Posture solution to the CrowdStrike Store, a cybersecurity app marketplace.
Read more
Adaptive Shield Team
●
March 15, 2022
Adaptive Shield Team
●
March 15, 2022
The Importance of Automated Offboarding to Keep Your SaaS Stack Safe
When it comes to taking old users off systems - deprovisioning - there are a few best practices that should be borne in mind and followed. Read more to get all the details.
Read more
Daniel Meschiany
●
February 23, 2022
Daniel Meschiany
●
February 23, 2022
How SSPM Simplifies Your SOC2 SaaS Security Posture Audit
If you're beginning or on a SOC2 audit journey, then read about how our SSMP solution can streamline the process and shorten the time it takes to pass a SOC2 audit successfully, fully covering your SaaS Security posture.
Read more
Hananel Livneh
●
February 16, 2022
Hananel Livneh
●
February 16, 2022
Adaptive Shield Joins Cloud Security Alliance to Raise Awareness Around Critical SaaS Risks
Adaptive Shield, the leading SaaS Security Posture Management (SSPM) company, today announced that it has joined the Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
Read more
Adaptive Shield Team
●
January 12, 2022
Adaptive Shield Team
●
January 12, 2022
Top 3 SaaS Security Threats for 2022
With 2021 drawing to a close and many closing their plans and budgets for 2022, the time has come to do a brief wrap up of the SaaS Security challenges on the horizon. Here are the top 3 SaaS security posture challenges as we see them.
Read more
Eliana Vuijsje
●
December 23, 2021
Eliana Vuijsje
●
December 23, 2021
Adaptive Shield and Okta Join Forces to Deliver Integrated Solution for Fortified SaaS Security and Identity and Access Management
Joint Offering Ensures That Authorized Users Can Safely Access Any SaaS App Without Exposing Companies to Unnecessary Risks
Read more
Adaptive Shield Team
●
December 13, 2021
Adaptive Shield Team
●
December 13, 2021
The Ultimate SaaS Security Posture Management (SSPM) Checklist
Not all SSPM solutions are created equal. Get the complete guide along with the printable checklist here.
Read more
Eliana Vuijsje
●
November 29, 2021
Eliana Vuijsje
●
November 29, 2021
SaaS Attacks: Lessons from Real-Life Misconfiguration Exploits
There is a way to protect users from deceptive OAuth apps, misconfigurations and misappropriated user permissions. SaaS Security Posture Management (SSPM) takes an automated approach to tracking, and even remediating, the exploitable misconfigurations in organizations’ SaaS apps.
Read more
Maor Bin
●
November 24, 2021
Maor Bin
●
November 24, 2021
Securing SaaS Apps: CASB vs. SSPM
This blog breaks down the differences between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications.
Read more
Eliana Vuijsje
●
November 17, 2021
Eliana Vuijsje
●
November 17, 2021
A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365
In order to enable a smooth transition from these legacy protocols to a modern environment, we have created a step-by-step guide to help you reduce risk and reinforce your organization's M365 security.
Read more
Daniel Meschiany
●
November 3, 2021
Daniel Meschiany
●
November 3, 2021
The 2021 SaaS Security Report Uncovers Top Security Concerns of Today’s CISOs
This blog breaks down Adaptive Shield’s 2021 SaaS Security Survey Report and highlights some of the key data points.
Read more
Eliana Vuijsje
●
October 11, 2021
Eliana Vuijsje
●
October 11, 2021
Adaptive Shield Receives $30M Series A Investment from Insight Partners to Help Businesses Gain Control of All their SaaS Investments
This $30 million round A investment will enable Adaptive Shield to meet growing demand for Security Posture Management Solutions that eliminate misconfigurations across any SaaS platform including Office 365, Salesforce, Slack, GitHub and Workday
Read more
Adaptive Shield Team
●
October 4, 2021
Adaptive Shield Team
●
October 4, 2021
Ransomware Through SaaS: The New Frontier
When threat actors decide to target your SaaS applications, they can use more basic to the more sophisticated methods. In this blog, I’m going to take you through a SaaS ransomware attack and discuss the 3 steps to protect yourself from being a victim.
Read more
Maor Bin
●
September 20, 2021
Maor Bin
●
September 20, 2021
How Were 38 Million Records Exposed from Microsoft’s Power Apps?
More than 38 million records from entities that rely on Microsoft's Power Apps portals platform were exposed due to a SaaS misconfiguration. Read about the how and why in this post.
Read more
Maor Bin
●
August 26, 2021
Maor Bin
●
August 26, 2021
Adaptive Shield Named Winner in Black Unicorn Awards for 2021
Adaptive Shield has been named Top 10 Baby Black Unicorn in the prestigious award for cybersecurity companies who have the potential of being valued at $1B.
Read more
Adaptive Shield Team
●
August 12, 2021
Adaptive Shield Team
●
August 12, 2021
Salesforce Release Updates: A Cautionary Tale for Security Teams
Few people talk about managing the security aspects of Salesforce Release Updates. By understanding what Salesforce Release Updates are, why they pose a security risk, and how security teams can mitigate risk, Salesforce customers can better protect sensitive information.
Read more
Hananel Livneh
●
August 12, 2021
Hananel Livneh
●
August 12, 2021
The Cybersecurity Executive Order 2021: What It Means for Cloud and SaaS Security
The bulk of the Executive Order focuses on administrative tasks associated with it, including redefining contract language, setting timelines, and defining agency roles and responsibilities. For enterprises that don’t supply technology to the federal government, the Executive Order may feel unimportant. In reality, several of the basic tenets could be used by companies operating outside the federal IT supply chain.
Read more
Eliana Vuijsje
●
August 3, 2021
Eliana Vuijsje
●
August 3, 2021
How the Work-From-Home Shift Impacts SaaS Security
In the remote-work world, SaaS apps have become an enticing vector-of-choice for bad actors. Just think of the typical employee, working off-site, untrained in security measures, and how their access or privileges increase the risk of sensitive data being stolen, exposed, or compromised. However, it doesn’t have to be that way — a company’s SaaS security posture can be strengthened and SaaS configuration weaknesses can be avoided.
Read more
Eliana Vuijsje
●
July 29, 2021
Eliana Vuijsje
●
July 29, 2021
NIST Cybersecurity Framework: A Quick Guide for SaaS Security Compliance
Reading the NIST Framework in-depth, its complexity is apparent, and following it can be difficult. This article will review the CSF’s key elements, point out its key merits, and suggest implementations for SaaS security.
Read more
Hananel Livneh
●
July 22, 2021
Hananel Livneh
●
July 22, 2021
Adaptive Shield Partners with Macnica Networks for Expansion into Japan
Through this collaboration with Macnica Networks, Adaptive Shield can further accelerate the safe use of SaaS applications by Japanese companies, helping them maintain a clean, safe and efficient SaaS app environment.
Read more
Adaptive Shield Team
●
July 20, 2021
Adaptive Shield Team
●
July 20, 2021
Top 5 Attacks in Commonly Used SaaS Apps
Remember when cybersecurity was mostly about firewalls, VPNs, and antivirus software? Those days are long gone. Now one of the most prevalent places for exploitation has to do with misconfigurations found in an organization's SaaS apps.
Read more
Maor Bin
●
June 6, 2021
Maor Bin
●
June 6, 2021
Why SaaS Security is So Hard
For enterprise organizations, ensuring that all the SaaS apps are configured properly and have the correct user roles and privileges is not only a never-ending, time-consuming endeavor, but an impossible one. Here is a rundown of the main issues security teams face that make SaaS security complex, laborious and just...hard.
Read more
Maor Bin
●
May 31, 2021
Maor Bin
●
May 31, 2021
Adaptive Shield named Winner for Next Gen in Vulnerability Management during RSA Conference 2021
Adaptive Shield wins Next-Gen Vulnerability Assessment, Remediation and Management Award in the 9th annual Global InfoSec Awards at #RSAC 2021.
Read more
Adaptive Shield Team
●
May 20, 2021
Adaptive Shield Team
●
May 20, 2021
CISO/Security Vendor Relationship Podcast Talks About SaaS Security Posture and More
A recap of the CISO/Security Vendor Relationship podcast, hosted by David Spark and Mark Johnson, with our sponsored guest, TIAA's Travis Hoyt.
Read more
Adaptive Shield Team
●
March 31, 2021
Adaptive Shield Team
●
March 31, 2021
The Weakest Link in Your Security Posture: Misconfigured SaaS Settings
With the spike in SaaS adoption, SaaS Security Posture Management (SSPM) is critical to today's company's security. Read more to see what SSPM solutions should provide.
Read more
Eliana Vuijsje
●
March 4, 2021
Eliana Vuijsje
●
March 4, 2021
Adaptive Shield Delivers SaaS Security on the Snowflake Data Marketplace
Outside the domain of Snowflake’s robust native security controls, potential vulnerabilities and configuration weakness can still occur. Read more to gain insight and free access to SaaS Security for Snowflake.
Read more
Adaptive Shield Team
●
January 12, 2021
Adaptive Shield Team
●
January 12, 2021
Solarwinds Source Code Breach - How to Protect Your Source Code Management Platform
You've probably already heard about the epic Solorigate or Sunburst breach. Read more to gain practical recommendations on how infosec and corporate security teams can better secure their source code management platforms.
Read more
Gilad Walden
●
December 28, 2020
Gilad Walden
●
December 28, 2020
What Airports Have in Common With SaaS Security Misconfigurations
Like most airports in the world, SaaS environments are inherently chaotic and fragmented. Read more to see how addressing the unique management challenges of the SaaS application space, can help security teams proactively take charge of their landscape.
Read more
Adam Pomson
●
December 24, 2020
Adam Pomson
●
December 24, 2020
Worried About SaaS Misconfigurations? You Should Be. Check These 5 Settings Everybody Misses
SaaS misconfigurations can put your organization at risk. Use this quick guide to prevent some of the most common SaaS misconfigurations.
Read more
Gilad Walden
●
October 19, 2020
Gilad Walden
●
October 19, 2020
Prevent Unwanted Guests in Your Mailboxes
Shared mailboxes can create security risks. Learn how you can easily minimize these risks and reduce mailbox misconfigurations across your organization.
Read more
Maor Bin
●
October 4, 2020
Maor Bin
●
October 4, 2020
Account Takeovers (ATOs): Why They Happen, What Organizations are Doing to Prevent Them, And Why it's Not Enough
Account takeovers pose a significant threat to organizations. Learn what works--and what doesn't work--to prevent them.
Read more
Maor Bin
●
September 10, 2020
Maor Bin
●
September 10, 2020
Extending Complete Control Across SaaS Applications With Adaptive Shield
As security professionals who have spent more than a few years in the industry, we know a good challenge when we see one.
Read more
Maor Bin
●
August 2, 2020
Maor Bin
●
August 2, 2020
Using Zoom? Stay Secure With These 12 Tips
During mandatory Work From Home situations, business communication and productivity are major factors of success.
Read more
Maor Bin
●
March 23, 2020
Maor Bin
●
March 23, 2020
New Cloud Security Alliance Survey Finds SaaS Security Has Become a Top Priority for 80% of Organizations
The attack surface in the SaaS ecosystem is widening and organizations need to know how to secure their SaaS data.
Read more
Adaptive Shield Team
●
June 5, 2023
Adaptive Shield Team
●
June 5, 2023
Why Telecoms Struggle with SaaS Security
Telecom companies are facing challenges when it comes to securing their SaaS applications. This is due to the complexity of the SaaS model and the fact that telecom companies are not always equipped to handle the unique security requirements of SaaS.
Read more
Arye Zacks
●
May 16, 2023
Arye Zacks
●
May 16, 2023
CASB vs SSPM
CASBs and SSPM are complementary solutions, however, they each focus on different aspects of SaaS data security. This blog will dive into the key differences between the two solutions and how CASB and SSPM can work together to create a consolidated SaaS security program.
Read more
Adaptive Shield Team
●
April 20, 2023
Adaptive Shield Team
●
April 20, 2023
What's the Difference Between CSPM & SSPM?
Better understand the difference between CSPM and SSPM and the value derived from each solution.
Read more
Adaptive Shield Team
●
April 17, 2023
Adaptive Shield Team
●
April 17, 2023
Benchmarks for SaaS Apps: Access Control
Access Control has the highest impact on your company’s SaaS security posture. How do your SaaS configurations compare?
Read more
Adaptive Shield Team
●
April 12, 2023
Adaptive Shield Team
●
April 12, 2023
Benchmarks for SaaS Apps: A Guide to Measure Your Company’s SaaS Baselines & Risk
In our Benchmarks for SaaS Apps series, we’ll share benchmark data for five high-impact security domains.
Read more
Adaptive Shield Team
●
April 11, 2023
Adaptive Shield Team
●
April 11, 2023
Think Before You Share the Link: SaaS in the Real World
There are essentially two ways to share files and documents out of a SaaS application: Make the resource available to specific users or make it available to "anyone with a link". Many users think that the latter is far more convenient, but the truth is that it opens organizations to significant risk.
Read more
Arye Zacks
●
April 3, 2023
Arye Zacks
●
April 3, 2023
Top 7 SaaS Security Activities at RSA 2023
The RSA conference is back for 2023 and there is a lot happening but only so many hours in the day. That's why we have gathered a list of the top 7 activities for the SaaS security aficionados to hit at RSA 2023.
Read more
Zehava Musahanov
●
March 27, 2023
Zehava Musahanov
●
March 27, 2023
SaaS Rootkit Exploits Hidden Rules in Microsoft 365
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
Read more
Maor Bin
●
March 21, 2023
Maor Bin
●
March 21, 2023
How to Apply NIST Principles to SaaS in 2023
NIST is considered a leading authority in the field of global cybersecurity standards. Understanding how to set these standards for your SaaS ecosystem security may be challenging but is crucial.
Read more
Arye Zacks
●
March 13, 2023
Arye Zacks
●
March 13, 2023
Shocking Findings from the 2023 Third-Party App Access Report
Dive into the 5 key findings from the new SaaS-to-SaaS Access Report, Uncovering the Risks & Realities of Third-Party Connected Apps.
Read more
Eliana Vuijsje
●
March 8, 2023
Eliana Vuijsje
●
March 8, 2023
Granting 3rd-Party Apps Access to Microsoft 365 and Google Workspace Presents Major Security Risks, According to Adaptive Shield Report
Our new report takes a look at the how volume of applications being connected to the SaaS stack and the risk they represent to company data.
Read more
Adaptive Shield Team
●
February 27, 2023
Adaptive Shield Team
●
February 27, 2023
SaaS in the Real World: Who’s Responsible to Secure This Data
When SaaS apps first grew in popularity, it wasn't clear who was responsible for securing the data/ Nowadays, most security and IT teams are aware of the shared responsibility model, where the provider is responsible for the app and the organization is responsible for the data. The bigger question today is where does the data responsibility lies on the organization's side?
Read more
Arye Zacks
●
February 20, 2023
Arye Zacks
●
February 20, 2023
What Are the Cyber Risks with SaaS?
Oftentimes, security teams assume that data stored within SaaS apps is less sensitive than other corporate IP and accept that the security tools built into the SaaS app are strong enough to provide adequate protection. This assumption, however, is leaving critical data exposed online, putting organizations at risk of data exposure, ransomware, and regulatory fines.
Read more
Arye Zacks
●
February 13, 2023
Arye Zacks
●
February 13, 2023
SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric
The move to SaaS and other cloud tools has put an emphasis on Identity & Access Management (IAM), and the tools used to define IAM make up its identity fabric. Unfortunately, these tools are being pushed to their limits due to decentralized IT, evolving threats, and zero-trust tools. An SSPM solution helps add a layer to an organization's identity fabric by enabling continuous monitoring and suspicious behavior alerts.
Read more
Arye Zacks
●
January 30, 2023
Arye Zacks
●
January 30, 2023
Why Do User Permissions Matter for SaaS Security?
User permissions are considered a headache to configure by both admins and users, but they remain crucial to protect organizations from both external attacks and internal data-sharing errors.
Read more
Arye Zacks
●
January 23, 2023
Arye Zacks
●
January 23, 2023
Breach Debrief Series: Nissan North America
Nissan North America security incident affected almost 18,000 customers. Read all about the breach and how to protect your organization from one like it.
Read more
Hananel Livneh
●
January 18, 2023
Hananel Livneh
●
January 18, 2023
100 Apps, Endless Security Checks
With an average of 100 apps being used, the average security team is flying blind without visibility and control over a critical mass of their organization’s entire SaaS app stack. It’s important that all SaaS apps be managed at scale, which is why organizations need a solution that offers both comprehensive checks and breadth of app coverage.
Read more
Adaptive Shield Team
●
January 16, 2023
Adaptive Shield Team
●
January 16, 2023
SaaS in the Real World: User Access After Downsizing
Over the last year, we’ve seen increasing evidence of an upcoming recession. While no one knows exactly what 2023 will bring to the labor market, organizations need to be prepared for potential downsizing.
Read more
Arye Zacks
●
January 9, 2023
Arye Zacks
●
January 9, 2023
Slack GitHub Breach: How It Happened and How You Can Protect Your Repository
Over the holiday weekend, Slack detected a breach after noticing suspicious activity, and in their investigation found that stolen Slack employee tokens were the source of the breach. This is one of many examples that shows how crucial it is for organizations to secure their repositories.
Read more
Hananel Livneh
●
January 5, 2023
Hananel Livneh
●
January 5, 2023
SaaS in the Real World: M&A Due Diligence
As executives are planning an acquisition or divestiture within the next 12-18 months, M&A due diligence is key to business resurgence, strategic growth, and capability expansion. Unfortunately, one area that’s often overlooked during M&A due diligence is a target company’s SaaS landscape.
Read more
Arye Zacks
●
January 4, 2023
Arye Zacks
●
January 4, 2023
Top 4 SaaS Security Threats for 2023
This past year has seen its fair share of breaches, attacks, and leaks, forcing organizations to scramble to protect their SaaS stacks. With SaaS sprawl ever growing and becoming more complex, organizations can look to four areas within their SaaS environment to harden and secure.
Read more
Zehava Musahanov
●
December 19, 2022
Zehava Musahanov
●
December 19, 2022
Webinar Spotlight: Pinpoint Your SaaS App Risks from Evaluation to Usage
A recap of a webinar with our CEO Maor Bin and Panorays's CTO Demi Ben Ari, where they discuss how to pinpoint your SaaS app risks from evaluation to usage.
Read more
Zehava Musahanov
●
December 5, 2022
Zehava Musahanov
●
December 5, 2022
Key Takeaways from Forrester’s Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management Report
Forrester interviews customers across different organizations who have implemented an SSPM solution Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management report. This blog will discuss the key takeaways from the report.
Read more
Zehava Musahanov
●
November 23, 2022
Zehava Musahanov
●
November 23, 2022
Use Case Series: Identity and Access Management Governance
Every SaaS app user and login is a potential threat, which is why identity and access management (IAM) is crucial for a strong SaaS security posture. However, it is IAM Governance that enables the security team to act upon arising issues by providing constant monitoring of the company’s SaaS Security posture as well as its implementation of access control.
Read more
Zehava Musahanov
●
November 16, 2022
Zehava Musahanov
●
November 16, 2022
Not All Sandboxes Are for Children: How to Secure Your SaaS Sandbox
When creating a Sandbox, the mindset tends to be that the Sandbox will have no effect on the production or operational system. This mindset is not only wrong, but extremely dangerous. This article will walk you through what is a SaaS sandbox, why it is vulnerable, and how to secure it.
Read more
Hananel Livneh
●
October 25, 2022
Hananel Livneh
●
October 25, 2022
Webinar Spotlight: SaaS Security Trends, Challenges, and Solutions for 2022
The highlights from our SaaS Security Trends, Challenges and Solutions for 2022 webinar, led by our CEO Maor Bin and Okta VP of Strategy Stephen Lee.
Read more
Zehava Musahanov
●
October 19, 2022
Zehava Musahanov
●
October 19, 2022
The Ultimate SaaS Security Posture Management Checklist, 2023 Edition
It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If SSPM is on your radar, the 2023 checklist edition covers the critical features and capabilities when evaluating a solution.
Read more
Eliana Vuijsje
●
October 12, 2022
Eliana Vuijsje
●
October 12, 2022
Ensuring SaaS Security in ISO Compliance
The International Organization for Standardization (ISO) sets standards across various industries. ISO 27000:2018 and ISO 27001:2013 can be used to help build out a strong security posture. Read more to understand the two recent yet different versions of ISO compliance standards and how SSPM can help security teams ensure ISO compliance.
Read more
Adaptive Shield Team
●
September 28, 2022
Adaptive Shield Team
●
September 28, 2022
Who Has Control: The SaaS App Admin Paradox
Security teams are responsible for securing the organizations' SaaS app stack but they can't execute this task without full control of the SaaS app of which up to 40% are owned by business departments.
Read more
Eliana Vuijsje
●
September 20, 2022
Eliana Vuijsje
●
September 20, 2022
Adaptive Shield and Tenable Partner to Enhance SaaS Security Posture
Adaptive Shield partners with Tenable, the Cyber Exposure Management company, to provide a consolidated posture management solution that correlates the risk of SaaS users and their endpoints.
Read more
Adaptive Shield Team
●
September 14, 2022
Adaptive Shield Team
●
September 14, 2022
GIFShell Attack Through Microsoft Teams: What Is It and How You Can Protect Yourself from It
A deep dive into the recently discovered GIFShell attack technique, which enables bad actors to exploit several Microsoft Teams features to act as a C&C for malware, and the best practices to protect against it.
Read more
Shir Hishman
●
September 13, 2022
Shir Hishman
●
September 13, 2022
Misconfigurations 101: The Three V’s of SaaS App Configurations Weaknesses
The ease with which SaaS apps can be deployed and adopted is remarkable, but it has quickly become a double-edged sword. On one hand, the availability of SaaS tools enables employees to work from anywhere. For IT and security teams however, the adoption of SaaS apps has become a daunting endeavor. Misconfigurations are brought on by many different factors, the top three can be summed up into the three V’s.
Read more
Adaptive Shield Team
●
September 8, 2022
Adaptive Shield Team
●
September 8, 2022
The Next Trends In SaaS Security
As the investment in SaaS apps continues, new critical SaaS challenges emerge beyond the classic use case of misconfiguration and user permissions management, such as SaaS-to-SaaS access and device-to-SaaS-user posture management. This blog will give a brief overview of the trends in SaaS security.
Read more
Maor Bin
●
August 16, 2022
Maor Bin
●
August 16, 2022
SaaS Security Use Case Series: Device-to-SaaS User Risk
Employees now use their personal devices, whether their phone or personal laptop, etc. to get their jobs done. If the device’s hygiene is not up to par, it increases the SaaS app attack surface for bad actors. Read more to find out how to combat these risks.
Read more
Eliana Vuijsje
●
August 11, 2022
Eliana Vuijsje
●
August 11, 2022
SaaS Security Use Case Series: SaaS-to-SaaS Access
When SaaS platforms ask for permissions' access, they are usually granted without a second thought, not realizing that these addition connections present more opportunities for bad actors to gain access to their company's data. Read all about the SaaS-to-SaaS connection process and how to combat its risks.
Read more
Eliana Vuijsje
●
August 8, 2022
Eliana Vuijsje
●
August 8, 2022
What It Takes to Tackle Your SaaS Security
It’s not a new concept that Office 365, Salesforce, Slack, Google Workspace or Zoom, etc. are amazing for enabling the hybrid workforce and hyper productivity in businesses today. However, there are three main challenges that have arisen stemming from this evolution.
Read more
Eliana Vuijsje
●
July 26, 2022
Eliana Vuijsje
●
July 26, 2022
Adaptive Shield Selected as SC Media Trust Award Finalist for Best Cloud Security Posture Management Solution
Adaptive Shield has been recognized as a Trust Award finalist in the Best Cloud Security Posture Management Solution category for the 2022 SC Awards.
Read more
Adaptive Shield Team
●
July 6, 2022
Adaptive Shield Team
●
July 6, 2022
Omdia’s On the Radar Report Covers Adaptive Shield's SSPM Solution
Adaptive Shield is officially On the Radar in Omdia's report for an innovative solution making a big impact in the SaaS security space.
Read more
Zehava Musahanov
●
June 29, 2022
Zehava Musahanov
●
June 29, 2022
Top 5 Configurations to Check When Setting Up a New SaaS App
The old days of buying new software, installing it on the company servers, and making sure everything works is gone - all hail the new IT king, SaaS apps. Yet the ease of connection should not create a false sense of security. Every SaaS platform’s settings need to be hardened to protect the company's assets. This blog post aims to ease that burden by providing a basic SaaS security checklist to make sure the basics are covered.
Read more
Hananel Livneh
●
June 21, 2022
Hananel Livneh
●
June 21, 2022
RSA 2022 Recap
After 2 years of virtual events, RSA Conference 2022 in San Francisco brought back face-to-face interaction. And wow, what an experience! From live sessions and parties to games and demos galore, RSA was packed with it all. Here’s a recap of Adaptive Shield at RSA.
Read more
Adaptive Shield Team
●
June 15, 2022
Adaptive Shield Team
●
June 15, 2022
Best Practices for an SSPM Solution to Help You Secure Your SaaS App Stack
The SaaS app attack surface has widened and recent research shows that up to 63 percent of organizations have dealt with security incidents because of a SaaS misconfiguration. Here are some of the best practices for an SSPM solution to help you secure your SaaS app stack.
Read more
Zehava Musahanov
●
June 7, 2022
Zehava Musahanov
●
June 7, 2022
Manual vs. SSPM: Research on What Streamlines SaaS Security Detection & Remediation
When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report.
Read more
Zehava Musahanov
●
May 31, 2022
Zehava Musahanov
●
May 31, 2022
Top 13 Cloud and SaaS Security Talks at RSA 2022
Every year the leaders and entrepreneurs of the cybersecurity world come together for four days for the annual RSA Conference. Finally, after many years of the event being virtual, RSA is back in its physical form. This year's conference will feature numerous presentations from industry leaders offering unique insights and fresh perspectives on the world of cloud and SaaS security. We have gathered a list of the 13 top talks taking place at RSA 2022.
Read more
Adaptive Shield Team
●
May 18, 2022
Adaptive Shield Team
●
May 18, 2022
SSPM Solving the SaaS Security Challenge of “Too Much to Do, Too Little Time”
A recap of a webinar with our CEO, Maor Bin and Omdia Senior Principal Analyst, Rik Turner discussing how SSPM is solving the SaaS security challenge of "too much to do, too little time".
Read more
Zehava Musahanov
●
May 11, 2022
Zehava Musahanov
●
May 11, 2022
7 Significant Findings from the 2022 SaaS Security Survey Report
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security professionals in today’s enterprises.
Read more
Eliana Vuijsje
●
May 3, 2022
Eliana Vuijsje
●
May 3, 2022
Adaptive Shield Recognized as a 2022 Gartner® Cool Vendors™
We are excited to announce that Gartner has named us a 2022 Gartner Cool Vendors™ in Application Security: Protection of Cloud-Native Applications. Read more to get all the details.
Read more
Adaptive Shield Team
●
April 26, 2022
Adaptive Shield Team
●
April 26, 2022
Into the Breach: Breaking Down 3 SaaS App Attacks in 2022
During the last week of March, three major tech companies - Microsoft, Okta, and HubSpot - reported significant data breaches. This blog will review the three breaches based on publicly disclosed information and suggest best practices to minimize the risk of such attacks succeeding against your organization.
Read more
Hananel Livneh
●
April 20, 2022
Hananel Livneh
●
April 20, 2022
New 2022 SaaS Security Survey Report Shines a Light on CISOs' Perspectives for Today's Enterprises
To better understand how teams are dealing with their SaaS security posture, Adaptive Shield partnered with the leading organization dedicated to promoting best practices for ensuring cyber security, Cloud Security Alliance (CSA), to develop the 2022 SaaS Security Survey Report.
Read more
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Team
●
April 12, 2022
The Importance of Automated Offboarding to Keep Your SaaS Stack Safe
When it comes to taking old users off systems - deprovisioning - there are a few best practices that should be borne in mind and followed. Read more to get all the details.
Read more
Daniel Meschiany
●
February 23, 2022
Daniel Meschiany
●
February 23, 2022
Top 3 SaaS Security Threats for 2022
With 2021 drawing to a close and many closing their plans and budgets for 2022, the time has come to do a brief wrap up of the SaaS Security challenges on the horizon. Here are the top 3 SaaS security posture challenges as we see them.
Read more
Eliana Vuijsje
●
December 23, 2021
Eliana Vuijsje
●
December 23, 2021
Securing SaaS Apps: CASB vs. SSPM
This blog breaks down the differences between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications.
Read more
Eliana Vuijsje
●
November 17, 2021
Eliana Vuijsje
●
November 17, 2021
A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365
In order to enable a smooth transition from these legacy protocols to a modern environment, we have created a step-by-step guide to help you reduce risk and reinforce your organization's M365 security.
Read more
Daniel Meschiany
●
November 3, 2021
Daniel Meschiany
●
November 3, 2021
Ransomware Through SaaS: The New Frontier
When threat actors decide to target your SaaS applications, they can use more basic to the more sophisticated methods. In this blog, I’m going to take you through a SaaS ransomware attack and discuss the 3 steps to protect yourself from being a victim.
Read more
Maor Bin
●
September 20, 2021
Maor Bin
●
September 20, 2021
How Were 38 Million Records Exposed from Microsoft’s Power Apps?
More than 38 million records from entities that rely on Microsoft's Power Apps portals platform were exposed due to a SaaS misconfiguration. Read about the how and why in this post.
Read more
Maor Bin
●
August 26, 2021
Maor Bin
●
August 26, 2021
Salesforce Release Updates: A Cautionary Tale for Security Teams
Few people talk about managing the security aspects of Salesforce Release Updates. By understanding what Salesforce Release Updates are, why they pose a security risk, and how security teams can mitigate risk, Salesforce customers can better protect sensitive information.
Read more
Hananel Livneh
●
August 12, 2021
Hananel Livneh
●
August 12, 2021
The Cybersecurity Executive Order 2021: What It Means for Cloud and SaaS Security
The bulk of the Executive Order focuses on administrative tasks associated with it, including redefining contract language, setting timelines, and defining agency roles and responsibilities. For enterprises that don’t supply technology to the federal government, the Executive Order may feel unimportant. In reality, several of the basic tenets could be used by companies operating outside the federal IT supply chain.
Read more
Eliana Vuijsje
●
August 3, 2021
Eliana Vuijsje
●
August 3, 2021
How the Work-From-Home Shift Impacts SaaS Security
In the remote-work world, SaaS apps have become an enticing vector-of-choice for bad actors. Just think of the typical employee, working off-site, untrained in security measures, and how their access or privileges increase the risk of sensitive data being stolen, exposed, or compromised. However, it doesn’t have to be that way — a company’s SaaS security posture can be strengthened and SaaS configuration weaknesses can be avoided.
Read more
Eliana Vuijsje
●
July 29, 2021
Eliana Vuijsje
●
July 29, 2021
NIST Cybersecurity Framework: A Quick Guide for SaaS Security Compliance
Reading the NIST Framework in-depth, its complexity is apparent, and following it can be difficult. This article will review the CSF’s key elements, point out its key merits, and suggest implementations for SaaS security.
Read more
Hananel Livneh
●
July 22, 2021
Hananel Livneh
●
July 22, 2021
Top 5 Attacks in Commonly Used SaaS Apps
Remember when cybersecurity was mostly about firewalls, VPNs, and antivirus software? Those days are long gone. Now one of the most prevalent places for exploitation has to do with misconfigurations found in an organization's SaaS apps.
Read more
Maor Bin
●
June 6, 2021
Maor Bin
●
June 6, 2021
Why SaaS Security is So Hard
For enterprise organizations, ensuring that all the SaaS apps are configured properly and have the correct user roles and privileges is not only a never-ending, time-consuming endeavor, but an impossible one. Here is a rundown of the main issues security teams face that make SaaS security complex, laborious and just...hard.
Read more
Maor Bin
●
May 31, 2021
Maor Bin
●
May 31, 2021
The Weakest Link in Your Security Posture: Misconfigured SaaS Settings
With the spike in SaaS adoption, SaaS Security Posture Management (SSPM) is critical to today's company's security. Read more to see what SSPM solutions should provide.
Read more
Eliana Vuijsje
●
March 4, 2021
Eliana Vuijsje
●
March 4, 2021
Solarwinds Source Code Breach - How to Protect Your Source Code Management Platform
You've probably already heard about the epic Solorigate or Sunburst breach. Read more to gain practical recommendations on how infosec and corporate security teams can better secure their source code management platforms.
Read more
Gilad Walden
●
December 28, 2020
Gilad Walden
●
December 28, 2020
What Airports Have in Common With SaaS Security Misconfigurations
Like most airports in the world, SaaS environments are inherently chaotic and fragmented. Read more to see how addressing the unique management challenges of the SaaS application space, can help security teams proactively take charge of their landscape.
Read more
Adam Pomson
●
December 24, 2020
Adam Pomson
●
December 24, 2020
Worried About SaaS Misconfigurations? You Should Be. Check These 5 Settings Everybody Misses
SaaS misconfigurations can put your organization at risk. Use this quick guide to prevent some of the most common SaaS misconfigurations.
Read more
Gilad Walden
●
October 19, 2020
Gilad Walden
●
October 19, 2020
Prevent Unwanted Guests in Your Mailboxes
Shared mailboxes can create security risks. Learn how you can easily minimize these risks and reduce mailbox misconfigurations across your organization.
Read more
Maor Bin
●
October 4, 2020
Maor Bin
●
October 4, 2020
Account Takeovers (ATOs): Why They Happen, What Organizations are Doing to Prevent Them, And Why it's Not Enough
Account takeovers pose a significant threat to organizations. Learn what works--and what doesn't work--to prevent them.
Read more
Maor Bin
●
September 10, 2020
Maor Bin
●
September 10, 2020
Extending Complete Control Across SaaS Applications With Adaptive Shield
As security professionals who have spent more than a few years in the industry, we know a good challenge when we see one.
Read more
Maor Bin
●
August 2, 2020
Maor Bin
●
August 2, 2020
Using Zoom? Stay Secure With These 12 Tips
During mandatory Work From Home situations, business communication and productivity are major factors of success.
Read more
Maor Bin
●
March 23, 2020
Maor Bin
●
March 23, 2020
How to Apply NIST Principles to SaaS in 2023
NIST is considered a leading authority in the field of global cybersecurity standards. Understanding how to set these standards for your SaaS ecosystem security may be challenging but is crucial.
Read more
Arye Zacks
●
March 13, 2023
Arye Zacks
●
March 13, 2023
Keeping SaaS Apps HIPAA Compliant
Healthcare organizations have been cautious in moving toward cloud technologies and SaaS applications. However, as the industry begins to shift and embraces the cloud, healthcare security professionals need to understand how SaaS security impacts their Health Insurance Portability and Accessibility Act (HIPAA) compliance posture.
Read more
Adaptive Shield Team
●
December 27, 2022
Adaptive Shield Team
●
December 27, 2022
Ensuring SaaS Security in ISO Compliance
The International Organization for Standardization (ISO) sets standards across various industries. ISO 27000:2018 and ISO 27001:2013 can be used to help build out a strong security posture. Read more to understand the two recent yet different versions of ISO compliance standards and how SSPM can help security teams ensure ISO compliance.
Read more
Adaptive Shield Team
●
September 28, 2022
Adaptive Shield Team
●
September 28, 2022
How SSPM Simplifies Your SOC2 SaaS Security Posture Audit
If you're beginning or on a SOC2 audit journey, then read about how our SSMP solution can streamline the process and shorten the time it takes to pass a SOC2 audit successfully, fully covering your SaaS Security posture.
Read more
Hananel Livneh
●
February 16, 2022
Hananel Livneh
●
February 16, 2022
NIST Cybersecurity Framework: A Quick Guide for SaaS Security Compliance
Reading the NIST Framework in-depth, its complexity is apparent, and following it can be difficult. This article will review the CSF’s key elements, point out its key merits, and suggest implementations for SaaS security.
Read more
Hananel Livneh
●
July 22, 2021
Hananel Livneh
●
July 22, 2021
New Cloud Security Alliance Survey Finds SaaS Security Has Become a Top Priority for 80% of Organizations
The attack surface in the SaaS ecosystem is widening and organizations need to know how to secure their SaaS data.
Read more
Adaptive Shield Team
●
June 5, 2023
Adaptive Shield Team
●
June 5, 2023
SaaS Rootkit Exploits Hidden Rules in Microsoft 365
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
Read more
Maor Bin
●
March 21, 2023
Maor Bin
●
March 21, 2023
Shocking Findings from the 2023 Third-Party App Access Report
Dive into the 5 key findings from the new SaaS-to-SaaS Access Report, Uncovering the Risks & Realities of Third-Party Connected Apps.
Read more
Eliana Vuijsje
●
March 8, 2023
Eliana Vuijsje
●
March 8, 2023
Granting 3rd-Party Apps Access to Microsoft 365 and Google Workspace Presents Major Security Risks, According to Adaptive Shield Report
Our new report takes a look at the how volume of applications being connected to the SaaS stack and the risk they represent to company data.
Read more
Adaptive Shield Team
●
February 27, 2023
Adaptive Shield Team
●
February 27, 2023
Key Takeaways from Forrester’s Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management Report
Forrester interviews customers across different organizations who have implemented an SSPM solution Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management report. This blog will discuss the key takeaways from the report.
Read more
Zehava Musahanov
●
November 23, 2022
Zehava Musahanov
●
November 23, 2022
Who Has Control: The SaaS App Admin Paradox
Security teams are responsible for securing the organizations' SaaS app stack but they can't execute this task without full control of the SaaS app of which up to 40% are owned by business departments.
Read more
Eliana Vuijsje
●
September 20, 2022
Eliana Vuijsje
●
September 20, 2022
GIFShell Attack Through Microsoft Teams: What Is It and How You Can Protect Yourself from It
A deep dive into the recently discovered GIFShell attack technique, which enables bad actors to exploit several Microsoft Teams features to act as a C&C for malware, and the best practices to protect against it.
Read more
Shir Hishman
●
September 13, 2022
Shir Hishman
●
September 13, 2022
The Next Trends In SaaS Security
As the investment in SaaS apps continues, new critical SaaS challenges emerge beyond the classic use case of misconfiguration and user permissions management, such as SaaS-to-SaaS access and device-to-SaaS-user posture management. This blog will give a brief overview of the trends in SaaS security.
Read more
Maor Bin
●
August 16, 2022
Maor Bin
●
August 16, 2022
SaaS Security Use Case Series: Device-to-SaaS User Risk
Employees now use their personal devices, whether their phone or personal laptop, etc. to get their jobs done. If the device’s hygiene is not up to par, it increases the SaaS app attack surface for bad actors. Read more to find out how to combat these risks.
Read more
Eliana Vuijsje
●
August 11, 2022
Eliana Vuijsje
●
August 11, 2022
Manual vs. SSPM: Research on What Streamlines SaaS Security Detection & Remediation
When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report.
Read more
Zehava Musahanov
●
May 31, 2022
Zehava Musahanov
●
May 31, 2022
SSPM Solving the SaaS Security Challenge of “Too Much to Do, Too Little Time”
A recap of a webinar with our CEO, Maor Bin and Omdia Senior Principal Analyst, Rik Turner discussing how SSPM is solving the SaaS security challenge of "too much to do, too little time".
Read more
Zehava Musahanov
●
May 11, 2022
Zehava Musahanov
●
May 11, 2022
7 Significant Findings from the 2022 SaaS Security Survey Report
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security professionals in today’s enterprises.
Read more
Eliana Vuijsje
●
May 3, 2022
Eliana Vuijsje
●
May 3, 2022
New 2022 SaaS Security Survey Report Shines a Light on CISOs' Perspectives for Today's Enterprises
To better understand how teams are dealing with their SaaS security posture, Adaptive Shield partnered with the leading organization dedicated to promoting best practices for ensuring cyber security, Cloud Security Alliance (CSA), to develop the 2022 SaaS Security Survey Report.
Read more
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Team
●
April 12, 2022
The 2021 SaaS Security Report Uncovers Top Security Concerns of Today’s CISOs
This blog breaks down Adaptive Shield’s 2021 SaaS Security Survey Report and highlights some of the key data points.
Read more
Eliana Vuijsje
●
October 11, 2021
Eliana Vuijsje
●
October 11, 2021
Top 5 Attacks in Commonly Used SaaS Apps
Remember when cybersecurity was mostly about firewalls, VPNs, and antivirus software? Those days are long gone. Now one of the most prevalent places for exploitation has to do with misconfigurations found in an organization's SaaS apps.
Read more
Maor Bin
●
June 6, 2021
Maor Bin
●
June 6, 2021
Adaptive Shield Strengthens Security Posture with New Certifications
In addition to being ISO 27001 certified and GDPR compliant, Adaptive Shield ensures highest global standards with new ISO 27701 (privacy) and SOC 2 Type II (security) certifications.
Read more
Adaptive Shield Team
●
May 29, 2023
Adaptive Shield Team
●
May 29, 2023
Granting 3rd-Party Apps Access to Microsoft 365 and Google Workspace Presents Major Security Risks, According to Adaptive Shield Report
Our new report takes a look at the how volume of applications being connected to the SaaS stack and the risk they represent to company data.
Read more
Adaptive Shield Team
●
February 27, 2023
Adaptive Shield Team
●
February 27, 2023
Adaptive Shield Partners with Datadog for Seamless SaaS Security Management
Adaptive Shield has partnered with Datadog, the observability service for cloud-scale applications, to provide joint customers with the ability to stream and visualize SaaS security alerts from Adaptive Shield.
Read more
Adaptive Shield Team
●
February 8, 2023
Adaptive Shield Team
●
February 8, 2023
Adaptive Shield Releases SaaS-to-SaaS Capabilities to Minimize Supply Chain Risks
The expansion of our SSPM platform enables security teams to discover and manage all SaaS apps connected to the core SaaS stack.
Read more
Adaptive Shield Team
●
November 30, 2022
Adaptive Shield Team
●
November 30, 2022
Adaptive Shield Announces 100 SaaS App Integrations for Comprehensive SaaS Security
Groundbreaking number of integrations within the company’s SSPM platform enables security teams to easily integrate, monitor and mitigate risk across their SaaS stack.
Read more
Adaptive Shield Team
●
November 9, 2022
Adaptive Shield Team
●
November 9, 2022
The Ultimate SaaS Security Posture Management Checklist, 2023 Edition
It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If SSPM is on your radar, the 2023 checklist edition covers the critical features and capabilities when evaluating a solution.
Read more
Eliana Vuijsje
●
October 12, 2022
Eliana Vuijsje
●
October 12, 2022
Adaptive Shield and Tenable Partner to Enhance SaaS Security Posture
Adaptive Shield partners with Tenable, the Cyber Exposure Management company, to provide a consolidated posture management solution that correlates the risk of SaaS users and their endpoints.
Read more
Adaptive Shield Team
●
September 14, 2022
Adaptive Shield Team
●
September 14, 2022
SaaS Security Use Case Series: SaaS-to-SaaS Access
When SaaS platforms ask for permissions' access, they are usually granted without a second thought, not realizing that these addition connections present more opportunities for bad actors to gain access to their company's data. Read all about the SaaS-to-SaaS connection process and how to combat its risks.
Read more
Eliana Vuijsje
●
August 8, 2022
Eliana Vuijsje
●
August 8, 2022
Adaptive Shield Selected as SC Media Trust Award Finalist for Best Cloud Security Posture Management Solution
Adaptive Shield has been recognized as a Trust Award finalist in the Best Cloud Security Posture Management Solution category for the 2022 SC Awards.
Read more
Adaptive Shield Team
●
July 6, 2022
Adaptive Shield Team
●
July 6, 2022
Omdia’s On the Radar Report Covers Adaptive Shield's SSPM Solution
Adaptive Shield is officially On the Radar in Omdia's report for an innovative solution making a big impact in the SaaS security space.
Read more
Zehava Musahanov
●
June 29, 2022
Zehava Musahanov
●
June 29, 2022
RSA 2022 Recap
After 2 years of virtual events, RSA Conference 2022 in San Francisco brought back face-to-face interaction. And wow, what an experience! From live sessions and parties to games and demos galore, RSA was packed with it all. Here’s a recap of Adaptive Shield at RSA.
Read more
Adaptive Shield Team
●
June 15, 2022
Adaptive Shield Team
●
June 15, 2022
Best Practices for an SSPM Solution to Help You Secure Your SaaS App Stack
The SaaS app attack surface has widened and recent research shows that up to 63 percent of organizations have dealt with security incidents because of a SaaS misconfiguration. Here are some of the best practices for an SSPM solution to help you secure your SaaS app stack.
Read more
Zehava Musahanov
●
June 7, 2022
Zehava Musahanov
●
June 7, 2022
New 2022 SaaS Security Survey Report Shines a Light on CISOs' Perspectives for Today's Enterprises
To better understand how teams are dealing with their SaaS security posture, Adaptive Shield partnered with the leading organization dedicated to promoting best practices for ensuring cyber security, Cloud Security Alliance (CSA), to develop the 2022 SaaS Security Survey Report.
Read more
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Team
●
April 12, 2022
Adaptive Shield Partners With CrowdStrike to Introduce Zero Trust SaaS Security Posture Solution to CrowdStrike Store
Adaptive Shield partners with CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, to introduce a new Zero Trust SaaS Security Posture solution to the CrowdStrike Store, a cybersecurity app marketplace.
Read more
Adaptive Shield Team
●
March 15, 2022
Adaptive Shield Team
●
March 15, 2022
Adaptive Shield Joins Cloud Security Alliance to Raise Awareness Around Critical SaaS Risks
Adaptive Shield, the leading SaaS Security Posture Management (SSPM) company, today announced that it has joined the Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
Read more
Adaptive Shield Team
●
January 12, 2022
Adaptive Shield Team
●
January 12, 2022
Top 3 SaaS Security Threats for 2022
With 2021 drawing to a close and many closing their plans and budgets for 2022, the time has come to do a brief wrap up of the SaaS Security challenges on the horizon. Here are the top 3 SaaS security posture challenges as we see them.
Read more
Eliana Vuijsje
●
December 23, 2021
Eliana Vuijsje
●
December 23, 2021
Adaptive Shield and Okta Join Forces to Deliver Integrated Solution for Fortified SaaS Security and Identity and Access Management
Joint Offering Ensures That Authorized Users Can Safely Access Any SaaS App Without Exposing Companies to Unnecessary Risks
Read more
Adaptive Shield Team
●
December 13, 2021
Adaptive Shield Team
●
December 13, 2021
Adaptive Shield Receives $30M Series A Investment from Insight Partners to Help Businesses Gain Control of All their SaaS Investments
This $30 million round A investment will enable Adaptive Shield to meet growing demand for Security Posture Management Solutions that eliminate misconfigurations across any SaaS platform including Office 365, Salesforce, Slack, GitHub and Workday
Read more
Adaptive Shield Team
●
October 4, 2021
Adaptive Shield Team
●
October 4, 2021
Adaptive Shield Named Winner in Black Unicorn Awards for 2021
Adaptive Shield has been named Top 10 Baby Black Unicorn in the prestigious award for cybersecurity companies who have the potential of being valued at $1B.
Read more
Adaptive Shield Team
●
August 12, 2021
Adaptive Shield Team
●
August 12, 2021
Adaptive Shield Partners with Macnica Networks for Expansion into Japan
Through this collaboration with Macnica Networks, Adaptive Shield can further accelerate the safe use of SaaS applications by Japanese companies, helping them maintain a clean, safe and efficient SaaS app environment.
Read more
Adaptive Shield Team
●
July 20, 2021
Adaptive Shield Team
●
July 20, 2021
Adaptive Shield named Winner for Next Gen in Vulnerability Management during RSA Conference 2021
Adaptive Shield wins Next-Gen Vulnerability Assessment, Remediation and Management Award in the 9th annual Global InfoSec Awards at #RSAC 2021.
Read more
Adaptive Shield Team
●
May 20, 2021
Adaptive Shield Team
●
May 20, 2021
CISO/Security Vendor Relationship Podcast Talks About SaaS Security Posture and More
A recap of the CISO/Security Vendor Relationship podcast, hosted by David Spark and Mark Johnson, with our sponsored guest, TIAA's Travis Hoyt.
Read more
Adaptive Shield Team
●
March 31, 2021
Adaptive Shield Team
●
March 31, 2021
Adaptive Shield Delivers SaaS Security on the Snowflake Data Marketplace
Outside the domain of Snowflake’s robust native security controls, potential vulnerabilities and configuration weakness can still occur. Read more to gain insight and free access to SaaS Security for Snowflake.
Read more
Adaptive Shield Team
●
January 12, 2021
Adaptive Shield Team
●
January 12, 2021
Webinar Spotlight: Pinpoint Your SaaS App Risks from Evaluation to Usage
A recap of a webinar with our CEO Maor Bin and Panorays's CTO Demi Ben Ari, where they discuss how to pinpoint your SaaS app risks from evaluation to usage.
Read more
Zehava Musahanov
●
December 5, 2022
Zehava Musahanov
●
December 5, 2022
Key Takeaways from Forrester’s Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management Report
Forrester interviews customers across different organizations who have implemented an SSPM solution Embrace A Paradigm Shift In SaaS Protection: SaaS Security Posture Management report. This blog will discuss the key takeaways from the report.
Read more
Zehava Musahanov
●
November 23, 2022
Zehava Musahanov
●
November 23, 2022
Webinar Spotlight: SaaS Security Trends, Challenges, and Solutions for 2022
The highlights from our SaaS Security Trends, Challenges and Solutions for 2022 webinar, led by our CEO Maor Bin and Okta VP of Strategy Stephen Lee.
Read more
Zehava Musahanov
●
October 19, 2022
Zehava Musahanov
●
October 19, 2022
RSA 2022 Recap
After 2 years of virtual events, RSA Conference 2022 in San Francisco brought back face-to-face interaction. And wow, what an experience! From live sessions and parties to games and demos galore, RSA was packed with it all. Here’s a recap of Adaptive Shield at RSA.
Read more
Adaptive Shield Team
●
June 15, 2022
Adaptive Shield Team
●
June 15, 2022
Use Case Series: Identity and Access Management Governance
Every SaaS app user and login is a potential threat, which is why identity and access management (IAM) is crucial for a strong SaaS security posture. However, it is IAM Governance that enables the security team to act upon arising issues by providing constant monitoring of the company’s SaaS Security posture as well as its implementation of access control.
Read more
Zehava Musahanov
●
November 16, 2022
Zehava Musahanov
●
November 16, 2022
SaaS Security Use Case Series: Device-to-SaaS User Risk
Employees now use their personal devices, whether their phone or personal laptop, etc. to get their jobs done. If the device’s hygiene is not up to par, it increases the SaaS app attack surface for bad actors. Read more to find out how to combat these risks.
Read more
Eliana Vuijsje
●
August 11, 2022
Eliana Vuijsje
●
August 11, 2022
SaaS Security Use Case Series: SaaS-to-SaaS Access
When SaaS platforms ask for permissions' access, they are usually granted without a second thought, not realizing that these addition connections present more opportunities for bad actors to gain access to their company's data. Read all about the SaaS-to-SaaS connection process and how to combat its risks.
Read more
Eliana Vuijsje
●
August 8, 2022
Eliana Vuijsje
●
August 8, 2022
Benchmarks for SaaS Apps: Password Management
Password policy and protocol settings prevent unauthorized visitors from accessing your SaaS. How do SaaS configurations measure up?
Read more
Adaptive Shield Team
●
May 23, 2023
Adaptive Shield Team
●
May 23, 2023
Benchmarks for SaaS App: Malware Protection
Most people don’t realize SaaS apps can be carriers for malware. How do your malware protection settings compare?
Read more
Adaptive Shield Team
●
May 8, 2023
Adaptive Shield Team
●
May 8, 2023
Benchmarks for SaaS Apps: Data Leakage Protection
Data leakage protection protects your data from unauthorized viewers. How do SaaS configurations measure up?
Read more
Adaptive Shield Team
●
April 24, 2023
Adaptive Shield Team
●
April 24, 2023
Benchmarks for SaaS Apps: Access Control
Access Control has the highest impact on your company’s SaaS security posture. How do your SaaS configurations compare?
Read more
Adaptive Shield Team
●
April 12, 2023
Adaptive Shield Team
●
April 12, 2023
Benchmarks for SaaS Apps: A Guide to Measure Your Company’s SaaS Baselines & Risk
In our Benchmarks for SaaS Apps series, we’ll share benchmark data for five high-impact security domains.
Read more
Adaptive Shield Team
●
April 11, 2023
Adaptive Shield Team
●
April 11, 2023
New Cloud Security Alliance Survey Finds SaaS Security Has Become a Top Priority for 80% of Organizations
The attack surface in the SaaS ecosystem is widening and organizations need to know how to secure their SaaS data.
Read more
Adaptive Shield Team
●
June 5, 2023
Adaptive Shield Team
●
June 5, 2023
SaaS in the Real World: Who’s Responsible to Secure This Data
When SaaS apps first grew in popularity, it wasn't clear who was responsible for securing the data/ Nowadays, most security and IT teams are aware of the shared responsibility model, where the provider is responsible for the app and the organization is responsible for the data. The bigger question today is where does the data responsibility lies on the organization's side?
Read more
Arye Zacks
●
February 20, 2023
Arye Zacks
●
February 20, 2023
SaaS in the Real World: User Access After Downsizing
Over the last year, we’ve seen increasing evidence of an upcoming recession. While no one knows exactly what 2023 will bring to the labor market, organizations need to be prepared for potential downsizing.
Read more
Arye Zacks
●
January 9, 2023
Arye Zacks
●
January 9, 2023
SaaS in the Real World: M&A Due Diligence
As executives are planning an acquisition or divestiture within the next 12-18 months, M&A due diligence is key to business resurgence, strategic growth, and capability expansion. Unfortunately, one area that’s often overlooked during M&A due diligence is a target company’s SaaS landscape.
Read more
Arye Zacks
●
January 4, 2023
Arye Zacks
●
January 4, 2023
Breach Debrief Series: Salesforce Community Sites
Several organizations, including banks and healthcare providers, have had their data leaked as a result of a misconfiguration in Salesforce Communities. Unfortunately, this is not a one-off event. This post will cover the leak as well as best practices to secure your Salesforce Community.
Read more
Hananel Livneh
●
May 4, 2023
Hananel Livneh
●
May 4, 2023
Breach Debrief Series: Nissan North America
Nissan North America security incident affected almost 18,000 customers. Read all about the breach and how to protect your organization from one like it.
Read more
Hananel Livneh
●
January 18, 2023
Hananel Livneh
●
January 18, 2023
Slack GitHub Breach: How It Happened and How You Can Protect Your Repository
Over the holiday weekend, Slack detected a breach after noticing suspicious activity, and in their investigation found that stolen Slack employee tokens were the source of the breach. This is one of many examples that shows how crucial it is for organizations to secure their repositories.
Read more
Hananel Livneh
●
January 5, 2023
Hananel Livneh
●
January 5, 2023
Into the Breach: Breaking Down 3 SaaS App Attacks in 2022
During the last week of March, three major tech companies - Microsoft, Okta, and HubSpot - reported significant data breaches. This blog will review the three breaches based on publicly disclosed information and suggest best practices to minimize the risk of such attacks succeeding against your organization.
Read more
Hananel Livneh
●
April 20, 2022
Hananel Livneh
●
April 20, 2022