top of page



How to Revoke Third-Party SaaS App Permissions in Google Workspace?
Google Workspace Over time, employees connect a variety of third-party SaaS apps to their Google Workspace accounts—some officially...
Jul 103 min read


What is IT Asset Management?
Onboarding should be smooth: You get your laptop, your credentials work, the tools you need are pre-installed—and security is already in...
Jul 83 min read


5 Steps to Implement DSPM Successfully
Successful strategy for your DPSM deployment Data Security Posture Management (DSPM) is one of the most promising solutions for...
Jul 72 min read


How to Get the Most Out of Your DSPM Tool
How to get the most ouf of your DSPM tool Data Security Posture Management (DSPM) tools are quickly becoming must-haves for modern...
Jun 303 min read


Best SaaS Identity Governance Solutions in 2025
In the age of SaaS sprawl, where organizations are drowning in a sea of third-party applications, identity governance is no longer a...
Jun 253 min read


What Is IT Asset Management (ITAM) for SaaS Applications — and Why It’s Critical for Security
IT Asset Management (ITAM) for SaaS Applications SaaS sprawl is no longer just a buzzword — it’s a daily reality for IT and security...
Jun 243 min read


How to Handle SaaS Data Deletion Requests?
Data privacy is no longer just a compliance checkbox—it’s a fundamental right that customers expect and regulators enforce. Whether it's...
Jun 233 min read


The Cybersecurity Talent Shortage Isn’t What You Think—It’s a Hiring Problem
We’ve all heard it: “There’s a cybersecurity talent shortage.” Headlines shout it, reports repeat it, and executives echo it in...
Jun 203 min read


When SaaS Becomes a Botnet: How Shadow IT Is Fueling a Silent Cybersecurity Threat
When SaaS Becomes a Botnet When you hear the term "botnet," you might imagine a swarm of buzzing robots or some far-off threat. In...
Jun 193 min read


How Demo and Test Accounts Are Getting Us into Trouble: The Truth About All of Our Environments
Test and Demo Accounts If you’ve ever spun up a test account to check out a new tool, you’re not alone. From engineers and IT teams to...
Jun 173 min read


Securing OAuth Tokens: 10 Best Practices to Safeguard Your SaaS Environment
OAuth tokens are powerful enablers of modern SaaS workflows. They allow users to seamlessly authorize third-party applications without...
Jun 163 min read


Valuation ≠ Value: How—And Why—Startups Became Obsessively Fixated on getting the most funding possible
Every day we see headlines like “New Security company valued at $X B” or “SaaS raises to $X M” —as if valuation alone signals success....
Jun 154 min read


There’s a Snow Leopard in Your Stack: Why Security Is About What You Can’t See
There’s a snow leopard in the image below. Can you spot it? Most people can’t right away. It blends perfectly into the rock and snow,...
Jun 132 min read


Why are AI Governance Platforms dead on arrival?
AI Governance Tools are dead on arrival AI Governance Tools and especially AI Security Tools are all the rage. Unfortunately the reality...
Jun 123 min read


How to Automate SaaS User Offboarding?
If you’ve ever had to offboard a user manually, you know the struggle. It’s a frustrating, time-consuming process that no one enjoys—but...
Jun 123 min read


What is IT Asset Management for the Cloud?
Imagine you’re managing a massive, ever-growing library—but instead of books, it’s filled with software, virtual machines, SaaS...
Jun 43 min read


Ask Waldo: What is Shadow SaaS?
Shadow SaaS, involves the use of unauthorized SaaS applications within an organization without approval.
Feb 281 min read
bottom of page
