Tag: saas
-
Mitiga Brings In $30M for Cloud and SaaS Protection Growth
Series B Funding Round to Drive European Expansion, R&D and Automated Remediation. Mitiga, a cloud security firm, has secured $30M in Series B funding to expand its solutions for detecting and responding to threats in public cloud and SaaS environments. Funds will support European market entry and R&D into automated remediation tools, boosting security operations…
-
Mitiga Banks$30M Series B to Expand Cloud and SaaS Security Platform
New York/Israel startup selling threat detection, investigation, and response tools banks $30 million in a Series B led by SYN Ventures. The post Mitiga Banks$30M Series B to Expand Cloud and SaaS Security Platform appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/mitiga-banks30m-series-b-to-expand-cloud-and-saas-security-platform/
-
Three Keys to Modernizing Data Security: DSPM, AI, and Encryption
Tags: access, ai, automation, best-practice, business, cloud, compliance, container, control, cyber, cybercrime, data, data-breach, detection, encryption, GDPR, incident response, infrastructure, privacy, regulation, risk, saas, security-incident, skills, software, strategy, threat, tool, vulnerabilityThree Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t“¦ Tue, 01/21/2025 – 14:56 Organizations worldwide face a “perfect storm” of increasing and ever-evolving cyber threats. Internal and external factors are at play, elevating cyber risks and their consequences and mandating new approaches to safeguard data. A recent study based on responses from over…
-
Keepit triumphiert bei den Cloud Awards 2024/25
Keepit setzt mit seiner spezialisierten SaaS-Datenschutzplattform neue Maßstäbe im Bereich Disaster Recovery und Business Continuity. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/keepit-triumphiert-bei-den-cloud-awards-2024-25/a39471/
-
Grip vs. TPRM – Amplify your TPRM Strategy
Discover how Grip complements TPRM platforms by uncovering shadow SaaS, enhancing identity security, and addressing risks traditional TPRM methods miss. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/grip-vs-tprm-amplify-your-tprm-strategy/
-
1Password’s Trelica Buy Part of Broader Shadow IT Play
The acquisition accelerates 1Password’s ongoing efforts to expand the role of the password manager with secure SaaS management. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/1password-trelica-buy-shadow-it-play
-
BeyondTrust flaw CVE-2024-12686 exploited in the wild
BeyondTrust discovered the flaw last month while investigating breaches of a ‘limited number’ of SaaS customers at the hands of Chinese state-sponsored threat actors. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366618092/CISA-BeyondTrust-flaw-CVE-2024-12686-exploited-in-the-wild
-
Grip vs SSPM: What’s the Difference? – Grip Security
Discover how Grip complements SSPM tools by uncovering shadow SaaS, and addressing identity risks, providing comprehensive SaaS security for your organization. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/grip-vs-sspm-whats-the-difference-grip-security/
-
Grip vs CASB: What’s the Difference?
Discover how Grip complements CASBs by reducing alert noise, uncovering shadow SaaS, and providing identity-based insights for comprehensive SaaS security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/grip-vs-casb-whats-the-difference/
-
2025 SaaS Security Word of the Year: Adaptability – Grip
Discover why adaptability is the 2025 SaaS security word of the year. This is the year to address shadow SaaS, AI risks, and evolving cyber threats effectively! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/2025-saas-security-word-of-the-year-adaptability-grip/
-
The Cost of Complacency in Credential Hygiene
The PowerSchool breach highlights the risks of poor credential hygiene. This article covers proactive steps to protect your SaaS environment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/the-cost-of-complacency-in-credential-hygiene/
-
Hacking Group ‘Silk Typhoon’ Linked to US Treasury Breach
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department’s Office of Foreign Assets Control. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hacking-group-silk-typhoon-linked-us-treasury-breach
-
Maintaining SOC 2 Compliance: A Strategic Approach for Businesses
Explore this blog to discover how a strategic approach can help your SaaS business maintain SOC 2 compliance effectively. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/maintaining-soc-2-compliance-a-strategic-approach-for-businesses/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Meet the WAF Squad – Impart Security
Introduction Web applications and APIs are critical parts of your attack surface, but managing WAFs has never been easy. False positives, rule tuning, risks of production outages, and log analysis – all of this work has made WAF historically difficult to operationalize. Well, that time is over. Meet Impart’s WAF Squad – a five-member squad…
-
1Password Acquires SaaS Access Management Provider Trelica
The deal will enhance 1Password Extended Access Management offering with capabilities to address challenges around SaaS sprawl and shadow IT. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/1password-acqiures-saas-access-management-trelica
-
Channel Brief: 1Password Acquires Trelica for SaaS Access Management
First seen on scworld.com Jump to article: www.scworld.com/news/channel-brief-1password-acquires-trelica-for-saas-access-management
-
CISA says hack targeting Treasury Department did not impact other federal agencies
BeyondTrust says an investigation of a December attack spree is nearing completion and SaaS instances are fully patched. Hackers used a stolen key to attack Treasury workstations. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-hack-treasury-federal-agencies/736654/
-
1Password Targets Shadow IT With Acquisition Of Trelica
The acquisition of SaaS access management firm Trelica will boost 1Password’s capabilities around discovery of unsanctioned IT usage, the company says. First seen on crn.com Jump to article: www.crn.com/news/security/2025/1password-targets-shadow-it-with-acquisition-of-trelica
-
1Password Acquires Trelica to Boost SaaS Access Management
Unified Extended Access Management Platform Gains Key Integrations and Workflows. The addition of Trelica allows 1Password to accelerate its extended access management roadmap by 18 months. The acquisition emphasizes simplicity for end users while unifying SaaS visibility, device management and identity security under a single solution. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/1password-acquires-trelica-to-boost-saas-access-management-a-27229
-
From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch
In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)”, a 75% increase from last year”, and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The…
-
Secure by design vs by default which software development concept is better?
Tags: access, api, application-security, attack, business, cisa, cloud, control, cyber, cybersecurity, data, data-breach, exploit, framework, guide, Hardware, infrastructure, malicious, mfa, nist, programming, resilience, risk, saas, security-incident, service, software, supply-chain, technology, threat, tool, update, vulnerabilityAs cybersecurity professionals, we need to know that the software products we acquire are safe and able to support or accommodate the procedures and tools we use to keep attackers at bay while performing their given functions.With attacks perennially on the rise and the software supply chain remaining as vulnerable as ever, there is momentum…

