top of page



How to Detect OAuth Access from SaaS Applications in Google Workspace
How to Detect OAuth Access from SaaS Applications in Google Workspace If you're in charge of IT or security, you've likely had that...
Jul 233 min read
Â
Â
Â


What Is BYOA? And Why It’s a Growing Security Concern
What is BYOA? Most security professionals are familiar with BYOD —Bring Your Own Device. But BYOA , or Bring Your Own Application , is...
Jul 173 min read
Â
Â
Â


How to Revoke Third-Party SaaS App Permissions in Microsoft 365?
How to Revoke Third-Party SaaS App Permissions in Microsoft 365? Modern IT teams face a growing, often invisible threat: third-party SaaS...
Jul 152 min read
Â
Â
Â


How ChatGPT and DeepSeek Are Getting Us in Trouble
A few years ago, no one could have predicted how quickly AI-powered SaaS platforms  would dominate business workflows. Now, it feels like...
Jun 273 min read
Â
Â
Â


SaaS Compliance Is Broken — and the Risk Is Bigger Than You Think
SaaS Compliance Is Broken GDPR. CCPA. PCI DSS.  These frameworks aren’t just regulatory acronyms — they’re the foundation of customer...
Jun 263 min read
Â
Â
Â


How Demo and Test Accounts Are Getting Us into Trouble: The Truth About All of Our Environments
Test and Demo Accounts If you’ve ever spun up a test account to check out a new tool, you’re not alone. From engineers and IT teams to...
Jun 173 min read
Â
Â
Â


There’s a Snow Leopard in Your Stack: Why Security Is About What You Can’t See
There’s a snow leopard in the image below. Can you spot it? Most people can’t right away. It blends perfectly into the rock and snow,...
Jun 132 min read
Â
Â
Â


Why ITDR Alone Isn’t Enough: The Case for SaaS Discovery
Identity Threat Detection and Response (ITDR) is one of the fastest-growing areas in cybersecurity—and it’s not hard to see why. Today’s...
Jun 102 min read
Â
Â
Â


Ransomware: How It Happened & Where We Go From Here in 2025
In the past year, ransomware attacks linked to Shadow SaaS accounts have surged, reminding us to stay vigilant in cybersecurity.
Mar 45 min read
Â
Â
Â


Ask Waldo: What is Shadow SaaS?
Shadow SaaS, involves the use of unauthorized SaaS applications within an organization without approval.
Feb 281 min read
Â
Â
Â
bottom of page