Cynet SaaS Security Posture Management (SSPM) – Tempemail

Software-as-a-service (SaaS) applications have gone from novelty to business necessity in a few short years, and its positive impact on organizations is clear. It’s safe to say that most industries today run on SaaS applications, which is undoubtedly positive, but it does introduce some critical new challenges to organizations. As Continue Reading

The Ultimate SaaS Security Posture Management (SSPM) Checklist – Tempemail

Cloud security is the umbrella that holds within it: IaaS, PaaS and SaaS. Gartner created the SaaS Security Posture Management (SSPM) category for solutions that continuously assess security risk and manage the SaaS applications’ security posture. With enterprises having 1,000 or more employees relying on dozens to hundreds of apps, Continue Reading

[eBook] The Guide for Reducing SaaS Applications Risk for Lean IT Security Teams – Tempemail

The Software-as-a-service (SaaS) industry has gone from novelty to an integral part of today’s business world in just a few years. While the benefits to most organizations are clear – more efficiency, greater productivity, and accessibility – the risks that the SaaS model poses are starting to become visible. It’s Continue Reading

New SaaS Security Report Dives into the Concerns and Plans of CISOs in 2021 – Tempemail

For years, security professionals have recognized the need to enhance SaaS security. However, the exponential adoption of Software-as-a-Service (SaaS) applications over 2020 turned slow-burning embers into a raging fire. Organizations manage anywhere from thirty-five to more than a hundred applications. From collaboration tools like Slack and Microsoft Teams to mission-critical Continue Reading

What It Means for Cloud and SaaS Security – Tempemail

In response to malicious actors targeting US federal IT systems and their supply chain, the President released the “Executive Order on Improving the Nation’s Cybersecurity (Executive Order).” Although directed at Federal departments and agencies, the Executive Order will likely have a ripple effect through the Federal technology supply stream. Private Continue Reading

Is Single Sign-On Enough to Secure Your SaaS Applications? – Tempemail

If there’s one thing all great SaaS platforms share in common, it’s their focus on simplifying the lives of their end-users. Removing friction for users in a safe way is the mission of single sign-on (SSO) providers. With SSO at the helm, users don’t have to remember separate passwords for Continue Reading

How the Work-From-Home Shift Impacts SaaS Security – Tempemail

The data is in. According to IBM Security’s 2020 Cost of a Data Breach Report, there is a 50% increase in cloud usage for enterprises across all industries. The number of threats targeting cloud services, predominantly collaboration services like Office 365,hasi ncreased 630%. Moreover, 75% of respondents report that discovery Continue Reading

Citrix Acquires SaaS Work Management Solutions Company, Wrike – Tempemail

Image sourced from The Business Journals Citrix has officially completed its acquisition of Wrike – a SaaS collaborative work management solutions company – for approximately $2.25 billion. Through the acquisition, Citrix is expected to deliver a comprehensive cloud-based work platform where employees and teams can securely access, collaborate and execute Continue Reading

The Weakest Link in Your Security Posture: Misconfigured SaaS Settings – Tempemail

In the era of hacking and malicious actors, a company’s cloud security posture is a concern that preoccupies most, if not all, organizations. Yet even more than that, it is the SaaS Security Posture Management (SSPM) that is critical to today’s company security. Recently Malwarebytes released a statement on how Continue Reading

Worried About SaaS Misconfigurations? Check These 5 Settings Everybody Misses – Tempemail

Image credit: Adaptive Shield Enterprises depend on SaaS applications for countless functions, like collaboration, marketing, file sharing, and more. But problematically, they often lack the resources to configure those apps to prevent cyberattacks, data exfiltration, and other risks. Catastrophic and costly data breaches result from SaaS security configuration errors. The Continue Reading