FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

A SaaS Security Challenge: Getting Permissions All in One PlaceΒ 

By: The Hacker News β€” May 8th 2024 at 14:18
Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each user’s base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. Layered on top of
☐ β˜† βœ‡ The Hacker News

Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms

By: The Hacker News β€” March 13th 2024 at 10:33
Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications that are especially vulnerable in this attack vector. The use of SaaS applications involves a wide range of identities, including human and non-human, such as service accounts, API keys, and OAuth authorizations. Consequently, any identity in a SaaS app can create an opening for cybercriminals to
☐ β˜† βœ‡ The Hacker News

Why Public Links Expose Your SaaS Attack Surface

By: The Hacker News β€” January 9th 2024 at 11:27
Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, Miro, and others promote the collaborative nature of their software applications that allows users to do more. Links to files, repositories, and boards can be shared with anyone, anywhere. This encourages teamwork that helps create stronger campaigns and projects by encouraging collaboration among employees
☐ β˜† βœ‡ The Hacker News

Top 5 Marketing Tech SaaS Security Challenges

By: The Hacker News β€” November 13th 2023 at 11:35
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach, Asana, Monday, and Box empower marketing teams, agencies, freelancers, and subject matter experts to collaborate seamlessly on campaigns and marketing initiatives.Β  These apps serve as the digital command centers for marketing
☐ β˜† βœ‡ The Hacker News

ServiceNow Data Exposure: A Wake-Up Call for Companies

By: The Hacker News β€” October 30th 2023 at 11:47
Earlier this week, ServiceNowΒ announced on its support siteΒ that misconfigurations within the platform could result in β€œunintended access” to sensitive data. For organizations that use ServiceNow, this security exposure is a critical concern that could have resulted in major data leakage of sensitive corporate data.Β ServiceNow has since taken steps to fix this issue.Β  This article fully analyzes
☐ β˜† βœ‡ The Hacker News

The Fast Evolution of SaaS Security from 2020 to 2024 (Told Through Video)

By: The Hacker News β€” October 16th 2023 at 11:46
SaaS Security’s roots are in configuration management. An astounding 35% of all security breaches begin with security settings that were misconfigured. In the past 3 years, the initial access vectors to SaaS data have widened beyond misconfiguration management. β€œSaaS Security on Tap” is a new video series that takes place in Eliana V's bar making sure that the only thing that leaks is beer (
☐ β˜† βœ‡ The Hacker News

The Rise of the Malicious App

By: The Hacker News β€” September 21st 2023 at 10:38
Security teams are familiar with threats emanating from third-party applications that employees add to improve their productivity. These apps are inherently designed to deliver functionality to users by connecting to a β€œhub” app, such as Salesforce, Google Workspace, or Microsoft 365. Security concerns center on the permission scopes that are granted to the third party apps, and the potential
☐ β˜† βœ‡ The Hacker News

7 Steps to Kickstart Your SaaS Security Program

By: The Hacker News β€” September 12th 2023 at 10:42
SaaS applications are the backbone of modern businesses, constituting a staggering 70% of total software usage. Applications like Box, Google Workplace, and Microsoft 365 are integral to daily operations. This widespread adoption has transformed them into potential breeding grounds for cyber threats. Each SaaS application presents unique security challenges, and the landscape constantly evolves
❌