top of page



The Cybersecurity Talent Shortage Isn’t What You Think—It’s a Hiring Problem
We’ve all heard it: “There’s a cybersecurity talent shortage.” Headlines shout it, reports repeat it, and executives echo it in...
Jun 20, 20253 min read


When SaaS Becomes a Botnet: How Shadow IT Is Fueling a Silent Cybersecurity Threat
When SaaS Becomes a Botnet When you hear the term "botnet," you might imagine a swarm of buzzing robots or some far-off threat. In...
Jun 19, 20253 min read


SaaS Security Compliance? SOC 2, GDPR, CCPA, ISO27001... What’s Important to Know?
If you’re running a modern business, odds are your tech stack is packed with SaaS applications—CRMs, HR platforms, collaboration tools,...
Jun 18, 20253 min read


How Demo and Test Accounts Are Getting Us into Trouble: The Truth About All of Our Environments
Test and Demo Accounts If you’ve ever spun up a test account to check out a new tool, you’re not alone. From engineers and IT teams to...
Jun 17, 20253 min read


Securing OAuth Tokens: 10 Best Practices to Safeguard Your SaaS Environment
OAuth tokens are powerful enablers of modern SaaS workflows. They allow users to seamlessly authorize third-party applications without...
Jun 16, 20253 min read


Valuation ≠ Value: How—And Why—Startups Became Obsessively Fixated on getting the most funding possible
Every day we see headlines like “New Security company valued at $X B” or “SaaS raises to $X M” —as if valuation alone signals success....
Jun 15, 20254 min read


There’s a Snow Leopard in Your Stack: Why Security Is About What You Can’t See
There’s a snow leopard in the image below. Can you spot it? Most people can’t right away. It blends perfectly into the rock and snow,...
Jun 13, 20252 min read


Why are AI Governance Platforms dead on arrival?
AI Governance Tools are dead on arrival AI Governance Tools and especially AI Security Tools are all the rage. Unfortunately the reality...
Jun 12, 20253 min read


How to Automate SaaS User Offboarding?
If you’ve ever had to offboard a user manually, you know the struggle. It’s a frustrating, time-consuming process that no one enjoys—but...
Jun 12, 20253 min read


Why ITDR Alone Isn’t Enough: The Case for SaaS Discovery
Identity Threat Detection and Response (ITDR) is one of the fastest-growing areas in cybersecurity—and it’s not hard to see why. Today’s...
Jun 10, 20252 min read


Security Doesn’t Break Under Attack—It Breaks Under Audit
When most people think of cybersecurity, they picture attacks: ransomware incidents, phishing emails, zero-day exploits. The drama. The...
Jun 6, 20252 min read


What is IT Asset Management for the Cloud?
Imagine you’re managing a massive, ever-growing library—but instead of books, it’s filled with software, virtual machines, SaaS...
Jun 4, 20253 min read


The Hidden Cybersecurity Risks of Test & Demo Accounts: Why IT Teams Must Take Action
If you’ve ever created a test account to evaluate a new tool, you’re not alone. But this is exactly the kind of backdoor attackers love.
Mar 27, 20253 min read


When Cybersecurity Becomes a Critical Aspect of BizOps
Integrating cybersecurity into business operations (BizOps) is essential in today's digital landscape. Here's how/why.
Mar 14, 20254 min read


The SaaS Trojan Horse: How It Happened & Where We Go From Here
In 2025, organizations are already facing a significant security threat from within: the SaaS Trojan Horse.
Mar 11, 20253 min read


Ransomware: How It Happened & Where We Go From Here in 2025
In the past year, ransomware attacks linked to Shadow SaaS accounts have surged, reminding us to stay vigilant in cybersecurity.
Mar 4, 20255 min read


Ask Waldo: What is Shadow SaaS?
Shadow SaaS, involves the use of unauthorized SaaS applications within an organization without approval.
Feb 28, 20251 min read


Forecasting the Most Common Small Business Cyberattacks in 2025
Small businesses are the backbone of the economy, fueling innovation, jobs, and community growth. But in 2025, these very same businesses...
Feb 19, 20256 min read


Cybersecurity for Small Business: A Beginner’s Guide
Small businesses are easy targets for cyber attacks. Discover the basics of cybersecurity for small business owners, from a small business.
Feb 16, 20255 min read
Top 5 Benefits of SaaS Discovery for IT and Security Teams
The adoption of Software-as-a-Service (SaaS) applications has exploded. While these tools enhance collaboration, productivity, and...
Jan 17, 20253 min read
bottom of page