top of page



How to Get the Most Out of Your DSPM Tool
How to get the most ouf of your DSPM tool Data Security Posture Management (DSPM) tools are quickly becoming must-haves for modern...
Jun 303 min read


How ChatGPT and DeepSeek Are Getting Us in Trouble
A few years ago, no one could have predicted how quickly AI-powered SaaS platforms  would dominate business workflows. Now, it feels like...
Jun 273 min read


SaaS Compliance Is Broken — and the Risk Is Bigger Than You Think
SaaS Compliance Is Broken GDPR. CCPA. PCI DSS.  These frameworks aren’t just regulatory acronyms — they’re the foundation of customer...
Jun 263 min read


How Demo and Test Accounts Are Getting Us into Trouble: The Truth About All of Our Environments
Test and Demo Accounts If you’ve ever spun up a test account to check out a new tool, you’re not alone. From engineers and IT teams to...
Jun 173 min read


There’s a Snow Leopard in Your Stack: Why Security Is About What You Can’t See
There’s a snow leopard in the image below. Can you spot it? Most people can’t right away. It blends perfectly into the rock and snow,...
Jun 132 min read


Why ITDR Alone Isn’t Enough: The Case for SaaS Discovery
Identity Threat Detection and Response (ITDR) is one of the fastest-growing areas in cybersecurity—and it’s not hard to see why. Today’s...
Jun 102 min read


The Hidden Cybersecurity Risks of Test & Demo Accounts: Why IT Teams Must Take Action
If you’ve ever created a test account to evaluate a new tool, you’re not alone. But this is exactly the kind of backdoor attackers love.
Mar 273 min read


Ransomware: How It Happened & Where We Go From Here in 2025
In the past year, ransomware attacks linked to Shadow SaaS accounts have surged, reminding us to stay vigilant in cybersecurity.
Mar 45 min read


Ask Waldo: What is Shadow SaaS?
Shadow SaaS, involves the use of unauthorized SaaS applications within an organization without approval.
Feb 281 min read
bottom of page
