Register to become a site member and receive access
to our premium blog content
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Read Article
April 12, 2021
What is a Data Breach?
Data Breach refers to an organization's sensitive data leaking or exposing to an outside party or in the public domain.
Read Article
April 1, 2021
What is Data Classification?
Unstructured data in documents, chats & tickets is making up a higher percentage of total footprint in organizations. Transactional databases and customer tables might still be the predominant form of system-of-record but generally these are also being fed from and used alongside SaaS platforms. Understanding what data an organization possesses is the first step towards harnessing it. This makes data classification even more important from a risk management perspective.
Read Article
March 20, 2021
What is the OSI Model?
The OSI model was the first standard model for network communications, introduced in 1983 by the major computer and telecom companies of the time. It was adopted by the ISO as an international standard in 1984, and has since been used to visualize how different networks operate and communicate. 
Read Article
March 17, 2021
Zendesk: Is Sensitive Data Exfiltrating via Tickets
Zendesk hosts and provides historic trail for a wealth of customer data – some of which is highly confidential, such as credit card information or addresses. Is it secure?
Read Article
March 11, 2021
3rd Party Installed Apps-Hidden Risk Inside your SaaS Platforms
Installed 3rd Party Apps over SaaS platforms are for enterprise what Apple App Store apps were for consumers in 2009. You think you are getting a free ping pong game without realizing that all your contacts, personal messages and location history is being exfiltrated to external servers!
Read Article
March 11, 2021
2 Factor Authorizations— No Longer an Option for Any Organization
Find out how a two-factor authorization system can significantly strengthen your data security in our article below.
Read Article
March 9, 2021
Cybersecurity perspectives from a former FBI Agent
Kevin Kline, a 30+ year veteran of the FBI & National Security, has dealt with cyber threats globally. He is currently helping organizations negotiate ransomware and develop defensive policies of protecting against insider threats. In this interview, he speaks to us about:
Read Article
March 2, 2021
What is CASB, and Why it Matters
Cloud hosted products comes with data exfiltration risks that are not well understood. This has definitely been heightened by remote teams and haphazard cloud adoption during COVID-19. Today’s IT teams face a multitude of cloud security challenges: managing remote access to applications, preventing data leakage, ensuring users are who they see are, watching for malware and more. Cloud access security broker (CASB) concept was designed to solve just these challenges. However the promise land pitched by CASB firms never quite came to fruition due to the operational inefficiencies inherent in most tools.
Read Article
February 28, 2021
The Ugly Truth about Security Software - Getting buried under too many false positives
False positives are expensive!! According to a Critical Start survey, every sixty minutes security operations centers (SOCs) run, fifteen minutes are wasted on false positives.
Read Article
February 16, 2021
How are Security Leaders Thinking of 2021 Budgets
Discover what measures security leaders around the world are taking to improve their security systems so that you can develop the right strategy and budget for 2021.
Read Article
February 16, 2021
Common SaaS Security Threats for Financial Institutions & How to Prevent Them
Discover some of the most common cybersecurity threats to financial institutions. Learn how you can reduce your risk and protect data.
Read Article
February 15, 2021
Behavioral Science approaches towards better security outcomes
‍Successful nudging techniques are based on a positive manipulation of people’s actions. They either make people stop and think, so they can choose a better outcome or, as with the organ donor example, rely on people’s tendency to take the easy option.
Read Article
February 9, 2021
Accidental Data Breaches: 3 golden rules for effective cybersecurity training
Accidental data breaches are a big and rising cost for businesses. Ponemon research shows that the majority (62%) of insider threats are caused by employee negligence or human error, with the average incident costing businesses $307,000 each time.
Read Article
January 28, 2021
Insider Trading in the post-SPAC (& Reddit) era: Who's minding your Slack Connect & Teams?
Reddit groups behind large stock moves recently are presumably bringing the power of the masses against Wall Street. While this is technically legal, a lesser publicized shift is happening in how insider trading is proliferating via SaaS communication tools. Proliferation of SPACs is creating more opportunities for ‘small exchange of info’ to make dramatic effects on underlying stocks-especially those with high day-trading volumes.
Read Article
January 19, 2021
Insider-Threat Protection for Financial Services: Implementation Challenges for SaaS Applications

Ready to get started?

We have generous free tiers available to get you started right away.

Request A Demo For Enterprise Solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Contact Us

New York
99 Wall Street #270
New York, NY 10015
United States
631-857-4206