Tag: saas
-
Enterprise SSO Platforms Compared: SSOJet vs Auth0 vs WorkOS vs Okta for SaaS
Compare SSOJet, Auth0, WorkOS, and Okta to choose the best enterprise SSO platform for SaaS. Learn architecture differences, pricing models, SCIM support, and implementation strategies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/enterprise-sso-platforms-compared-ssojet-vs-auth0-vs-workos-vs-okta-for-saas/
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Tackling the Uncontrolled Growth of AI Agents in Modern SaaS Environments
By 2026, AI agent sprawl has become a critical SaaS security risk. With 80% of organizations reporting unintended agent actions, the “visibility gap” is the new frontier for cyber threats. Learn how to govern autonomous agents using comprehensive inventories, permission mapping, and automated risk scoring. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/tackling-the-uncontrolled-growth-of-ai-agents-in-modern-saas-environments/
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
How to Implement JustTime (JIT) User Provisioning with SSO and SCIM
Just-in-Time (JIT) provisioning creates users during SSO login, while SCIM automates user lifecycle via APIs. Learn how to implement JIT provisioning, compare JIT vs SCIM, and build scalable SaaS authentication systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/how-to-implement-just-in-time-jit-user-provisioning-with-sso-and-scim/
-
AI Governance Starts With Access, Not Models – SaaS + AI
AI risk isn’t about models alone. Learn why SaaS + AI governance depends on access, OAuth, and integrations”, and how to move from chaos to control. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-governance-starts-with-access-not-models-saas-ai/
-
Reco targets AI agent blind spots with new security capability
Aiming where traditional SSPM falls short: Reco positions the launch as a break from traditional SSPM, arguing that those tools were never designed for autonomous systems.”SSPM sees connections. We see behavior,” Klein said. While a typical SSPM might flag a Zapier-Salesforce link as a third-party integration, “We identify that this specific Zapier workflow is an…
-
Identity Management for Multi-Tenant SaaS Applications
Learn how to implement identity management for multi-tenant SaaS applications with secure authentication, tenant isolation, and access control. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/identity-management-for-multi-tenant-saas-applications/
-
SaaS Sprawl has Become the New Shadow IT: Why Traditional Security Struggles to See (and Stop) It
Analysis of SaaS sprawl amplified by AI integrations arguing for continuous discovery, application-layer visibility, policy enforcement, and real-time remediation to tame shadow IT and API”‘level risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/saas-sprawl-has-become-the-new-shadow-it-why-traditional-security-struggles-to-see-and-stop-it/
-
The Quiet Security Risk Hiding Inside Your SaaS Stack
SaaS sprawl is quietly expanding enterprise attack surfaces. Learn how permissions, integrations and orphaned accounts create hidden security risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-quiet-security-risk-hiding-inside-your-saas-stack/
-
Runtime: The new frontier of AI agent security
Tags: access, ai, automation, ceo, ciso, computer, container, control, crowdstrike, cybersecurity, data, detection, edr, endpoint, firewall, framework, incident response, jobs, monitoring, network, openai, risk, saas, technology, threat, tool, vulnerability, zero-dayWhat runtime monitoring looks like: Once an organization knows where its agents are, the question is what to watch for, and how.Elia Zaitsev, CTO of CrowdStrike, tells CSO that existing endpoint detection and response (EDR) tools already capture the kinds of behavior needed to track AI agents. They instrument operating systems like a flight data…
-
LiveChat Support Tools Abused in SaaS Phishing Scheme
A newly identified campaign shows how Software-as-a-Service (SaaS) platforms like LiveChat are being weaponized to steal sensitive data in real time. Unlike traditional phishing attacks that rely on fake login pages or static forms, this tactic uses live chat conversations to extract credentials, financial data, and personally identifiable information (PII). The campaign begins with phishing…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
Shadow AI is everywhere. Here’s how to find and secure it.
Shadow AI is quietly spreading across SaaS environments as employees adopt new AI tools without IT oversight. Nudge Security explains how security teams can discover AI apps, monitor usage, and govern risky AI activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shadow-ai-is-everywhere-heres-how-to-find-and-secure-it/
-
LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data
Tags: attack, credentials, credit-card, cybercrime, data, email, exploit, finance, mfa, phishing, saas, service, threat, toolThreat actors are abusing the LiveChat SaaS platform to impersonate brands like PayPal and Amazon in phishing campaigns designed to steal credentials, credit card details, MFA codes, and other sensitive data. Victims are lured through phishing emails and directed to LiveChat pages where attackers use chat interactions to request personal and financial information. The campaign…
-
Why Customer Acquisition Cost Is Rising Faster Than Revenue for Many SaaS Companies
Tags: saasMany SaaS companies entering the market expect growth to follow a predictable formula. Launch marketing campaigns. Generate leads. Convert a portion of them into paying customers. Then…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/03/why-customer-acquisition-cost-is-rising-faster-than-revenue-for-many-saas-companies/
-
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Menlo Park, California, USA, March 13th, 2026, CyberNewswire AI-HealthTech innovator Humata Health announced that it is partnering with AccuKnox, a leader in Code to Cognition Security, Zero Trust Cloud-Native Application Protection Platform (CNAPP), to streamline security for its SaaS platform. Healthcare Security Requirements To meetHIPAAmandates, the company adopted an on-prem deployment supported by AccuKnox. By…
-
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Menlo Park, California, USA, March 13th, 2026, CyberNewswire AI-HealthTech innovator Humata Health announced that it is partnering with AccuKnox, a leader in Code to Cognition Security, Zero Trust Cloud-Native Application Protection Platform (CNAPP), to streamline security for its SaaS platform. Healthcare Security Requirements To meetHIPAAmandates, the company adopted an on-prem deployment supported by AccuKnox. By…
-
Understanding SOC 2 Controls for SaaS Providers
For SaaS providers, trust is a core part of the offering. Customers rely on software platforms to process data, support business operations, and integrate with wider technology ecosystems. As a result, demonstrating effective security and governance controls using frameworks like SOC 2 has become an increasingly important requirement when selling to enterprise customers. SOC 2″¦…
-
Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
Tags: access, authentication, business, cloud, communications, data, data-breach, group, identity, incident response, metric, mitigation, network, radius, resilience, saas, service, strategy, technology, updateSeverity is driven by customer impact, not by who is pagedWe maintain one current hypothesis, even if it is wrongWe keep one shared timeline that captures decisions, not just symptomsWe communicate on a predictable cadence, even when answers are incompleteEvery action has a named owner and an explicit “time we expect to learn”The biggest behavior…
-
Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
Tags: access, authentication, business, cloud, communications, data, data-breach, group, identity, incident response, metric, mitigation, network, radius, resilience, saas, service, strategy, technology, updateSeverity is driven by customer impact, not by who is pagedWe maintain one current hypothesis, even if it is wrongWe keep one shared timeline that captures decisions, not just symptomsWe communicate on a predictable cadence, even when answers are incompleteEvery action has a named owner and an explicit “time we expect to learn”The biggest behavior…
-
Delinea’s StrongDM Acquisition Highlights the Changing Role of PAM
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/delinea-strongdm-acquisition-highlights-changing-role-pam
-
Delinea’s StrongDM Acquisition Highlights the Changing Role of PAM
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/delinea-strongdm-acquisition-highlights-changing-role-pam
-
Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know
For B2B SaaS companies, Zero Trust isn’t an optional enterprise security concept. It’s what enterprise buyers are demanding, what audit frameworks require, and increasingly what separates companies that close deals from those that don’t. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/zero-trust-for-b2b-saas-what-every-founder-and-cto-needs-to-know/
-
Why access decisions are becoming the weakest link in identity security
Tags: access, ai, api, attack, authentication, automation, breach, business, ciso, control, credentials, data, finance, governance, group, iam, identity, least-privilege, login, okta, radius, risk, saas, service, technology, toolThe SSO fallacy: Why authentication is not a guarantee: I’m often asked by business and technology leaders, “If we have SSO enabled, why do we still need to worry about granular access controls?” The underlying assumption is that once a user is authenticated through a central, secure portal, the hard work is done.In practice, SSO…

