Learning center

Resources
Feb 2, 2023

Case Study | NFP leveraged Grip to keep pace with identity and SaaS sprawl

NFP spends 80% less time mitigating SaaS identity risk and reduced IAM costs by $800K per year. NFP’s security team tuned controls for their business-led IT reality, all while maintaining high security standards for SaaS and identities — past, present, and future.

Read article
Resources
Feb 2, 2023

Case Study | NFP leveraged Grip to keep pace with identity and SaaS sprawl

NFP spends 80% less time mitigating SaaS identity risk and reduced IAM costs by $800K per year. NFP’s security team tuned controls for their business-led IT reality, all while maintaining high security standards for SaaS and identities — past, present, and future.

Read article
Resources
Feb 2, 2023

Case Study | NFP leveraged Grip to keep pace with identity and SaaS sprawl

NFP spends 80% less time mitigating SaaS identity risk and reduced IAM costs by $800K per year. NFP’s security team tuned controls for their business-led IT reality, all while maintaining high security standards for SaaS and identities — past, present, and future.

Download
Resources
Feb 2, 2023

Case Study | NFP leveraged Grip to keep pace with identity and SaaS sprawl

NFP spends 80% less time mitigating SaaS identity risk and reduced IAM costs by $800K per year. NFP’s security team tuned controls for their business-led IT reality, all while maintaining high security standards for SaaS and identities — past, present, and future.

Register Now
Watch Webinar
News
Jan 30, 2023

Dark Reading: 10M JD Sports Customers' Info Exposed in Data Breach

UK sportswear retailer JD Sports is warning some 10 million of its customers that their personal data — including name, billing address, delivery address, email address, phone number, order details, and last four payment card digits — might have been exposed in a recent cyberattack.

Read article
News
Jan 30, 2023

Dark Reading: 10M JD Sports Customers' Info Exposed in Data Breach

UK sportswear retailer JD Sports is warning some 10 million of its customers that their personal data — including name, billing address, delivery address, email address, phone number, order details, and last four payment card digits — might have been exposed in a recent cyberattack.

Read article
News
Jan 30, 2023

Dark Reading: 10M JD Sports Customers' Info Exposed in Data Breach

UK sportswear retailer JD Sports is warning some 10 million of its customers that their personal data — including name, billing address, delivery address, email address, phone number, order details, and last four payment card digits — might have been exposed in a recent cyberattack.

Download
News
Jan 30, 2023

Dark Reading: 10M JD Sports Customers' Info Exposed in Data Breach

UK sportswear retailer JD Sports is warning some 10 million of its customers that their personal data — including name, billing address, delivery address, email address, phone number, order details, and last four payment card digits — might have been exposed in a recent cyberattack.

Register Now
Watch Webinar
News
Jan 27, 2023

Cyberwire: Joint advisory warns of remote monitoring and management software abuse.

The US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint advisory outlining the abuse of legitimate remote monitoring and management (RMM) software.

Read article
News
Jan 27, 2023

Cyberwire: Joint advisory warns of remote monitoring and management software abuse.

The US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint advisory outlining the abuse of legitimate remote monitoring and management (RMM) software.

Read article
News
Jan 27, 2023

Cyberwire: Joint advisory warns of remote monitoring and management software abuse.

The US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint advisory outlining the abuse of legitimate remote monitoring and management (RMM) software.

Download
News
Jan 27, 2023

Cyberwire: Joint advisory warns of remote monitoring and management software abuse.

The US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint advisory outlining the abuse of legitimate remote monitoring and management (RMM) software.

Register Now
Watch Webinar
News
Jan 13, 2023

Aflac & Zurich Insurance Customers in Japan have had Millions of Data Leaked

The Japanese customers of two large insurance companies Aflac and Zurich have had their personal information leaked after the breach of a third-party service provider. The attacked provider has not been identified, and neither company would comment on whether the two attacks were related.

Read article
News
Jan 13, 2023

Aflac & Zurich Insurance Customers in Japan have had Millions of Data Leaked

The Japanese customers of two large insurance companies Aflac and Zurich have had their personal information leaked after the breach of a third-party service provider. The attacked provider has not been identified, and neither company would comment on whether the two attacks were related.

Read article
News
Jan 13, 2023

Aflac & Zurich Insurance Customers in Japan have had Millions of Data Leaked

The Japanese customers of two large insurance companies Aflac and Zurich have had their personal information leaked after the breach of a third-party service provider. The attacked provider has not been identified, and neither company would comment on whether the two attacks were related.

Download
News
Jan 13, 2023

Aflac & Zurich Insurance Customers in Japan have had Millions of Data Leaked

The Japanese customers of two large insurance companies Aflac and Zurich have had their personal information leaked after the breach of a third-party service provider. The attacked provider has not been identified, and neither company would comment on whether the two attacks were related.

Register Now
Watch Webinar
Blog
Aug 30, 2022

5 SaaS Security Risks Every Company Needs to Address Immediately

Security teams do have products that help them discover and manage SaaS apps that are being used by their employees. However, the problem is that these products still rely on the outdated assumption that the company controls the endpoint, network access, or authentication method.

Read article
Blog
Aug 30, 2022

5 SaaS Security Risks Every Company Needs to Address Immediately

Security teams do have products that help them discover and manage SaaS apps that are being used by their employees. However, the problem is that these products still rely on the outdated assumption that the company controls the endpoint, network access, or authentication method.

Read article
Blog
Aug 30, 2022

5 SaaS Security Risks Every Company Needs to Address Immediately

Security teams do have products that help them discover and manage SaaS apps that are being used by their employees. However, the problem is that these products still rely on the outdated assumption that the company controls the endpoint, network access, or authentication method.

Download
Blog
Aug 30, 2022

5 SaaS Security Risks Every Company Needs to Address Immediately

Security teams do have products that help them discover and manage SaaS apps that are being used by their employees. However, the problem is that these products still rely on the outdated assumption that the company controls the endpoint, network access, or authentication method.

Register Now
Watch Webinar
Blog
Aug 23, 2022

3 Principles to Secure the SaaS Lifecycle

The core principles for protecting SaaS throughout its lifecycle are fundamentally about security architecture—discovery, justification, sanctioning, securing, and decommissioning are all implicated by security architecture. As SaaS moves through its lifecycle, security architects have an outsized impact on the fate of their organization’s SaaS defense.

Read article
Blog
Aug 23, 2022

3 Principles to Secure the SaaS Lifecycle

The core principles for protecting SaaS throughout its lifecycle are fundamentally about security architecture—discovery, justification, sanctioning, securing, and decommissioning are all implicated by security architecture. As SaaS moves through its lifecycle, security architects have an outsized impact on the fate of their organization’s SaaS defense.

Read article
Blog
Aug 23, 2022

3 Principles to Secure the SaaS Lifecycle

The core principles for protecting SaaS throughout its lifecycle are fundamentally about security architecture—discovery, justification, sanctioning, securing, and decommissioning are all implicated by security architecture. As SaaS moves through its lifecycle, security architects have an outsized impact on the fate of their organization’s SaaS defense.

Download
Blog
Aug 23, 2022

3 Principles to Secure the SaaS Lifecycle

The core principles for protecting SaaS throughout its lifecycle are fundamentally about security architecture—discovery, justification, sanctioning, securing, and decommissioning are all implicated by security architecture. As SaaS moves through its lifecycle, security architects have an outsized impact on the fate of their organization’s SaaS defense.

Register Now
Watch Webinar
News
Jun 15, 2022

SaaS security: How to avoid “death by 1000 apps”

CISOs are challenged to understand the scope of risk when employees are using hundreds of apps causing data proliferation and dormant zombie accounts that are no longer used but maintain unmanaged privileges. Read this Help Net Security article to gain insights into how modern CISOs are addressing this problem.

Read article
News
Jun 15, 2022

SaaS security: How to avoid “death by 1000 apps”

CISOs are challenged to understand the scope of risk when employees are using hundreds of apps causing data proliferation and dormant zombie accounts that are no longer used but maintain unmanaged privileges. Read this Help Net Security article to gain insights into how modern CISOs are addressing this problem.

Read article
News
Jun 15, 2022

SaaS security: How to avoid “death by 1000 apps”

CISOs are challenged to understand the scope of risk when employees are using hundreds of apps causing data proliferation and dormant zombie accounts that are no longer used but maintain unmanaged privileges. Read this Help Net Security article to gain insights into how modern CISOs are addressing this problem.

Download
News
Jun 15, 2022

SaaS security: How to avoid “death by 1000 apps”

CISOs are challenged to understand the scope of risk when employees are using hundreds of apps causing data proliferation and dormant zombie accounts that are no longer used but maintain unmanaged privileges. Read this Help Net Security article to gain insights into how modern CISOs are addressing this problem.

Register Now
Watch Webinar
Webinars
Oct 7, 2021

Modern SaaS Risks - CISOs share their SaaS security checklist

We’ve got SaaS. You’ve got SaaS. We’ve all got SaaS! But is it safe? Saas adoption is outpacing our capacity to manage its mounting risks with adapted technologies, policies and processes. Discover what some of cybersecurity’s most influential leaders intend to do about it.

Read article
Webinars
Oct 7, 2021

Modern SaaS Risks - CISOs share their SaaS security checklist

We’ve got SaaS. You’ve got SaaS. We’ve all got SaaS! But is it safe? Saas adoption is outpacing our capacity to manage its mounting risks with adapted technologies, policies and processes. Discover what some of cybersecurity’s most influential leaders intend to do about it.

Read article
Webinars
Oct 7, 2021

Modern SaaS Risks - CISOs share their SaaS security checklist

We’ve got SaaS. You’ve got SaaS. We’ve all got SaaS! But is it safe? Saas adoption is outpacing our capacity to manage its mounting risks with adapted technologies, policies and processes. Discover what some of cybersecurity’s most influential leaders intend to do about it.

Download
Webinars
Oct 7, 2021

Modern SaaS Risks - CISOs share their SaaS security checklist

We’ve got SaaS. You’ve got SaaS. We’ve all got SaaS! But is it safe? Saas adoption is outpacing our capacity to manage its mounting risks with adapted technologies, policies and processes. Discover what some of cybersecurity’s most influential leaders intend to do about it.

Register Now
Watch Webinar

Subscribe to our newsletter

Your request has been sent
Oops! Something went wrong while submitting the form.