The rise of software-as-a-service presents new business opportunities, but also new security challenges that need to be balanced with business enablement to ensure growth and protection. This guidebook on Securing Software-as-a-Service Applications, underwritten by Lookout, provides expert insights on how to integrate SaaS securely into businesses.
Cybersecurity
Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
GitGuardian addresses a critical and widespread problem: developers storing secrets, such as API keys, in repositories where they can be visible to nefarious actors.
Conway’s Law is a useful lens through which to examine security in large organizations, says analyst Robert Wood, noting that silos introduction friction.
Janet Schijns defines how AI apps, supported by partners, can automate everything from repetitive tasks to supply chains for better operational efficiency.
GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.
Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.
Robert Wood explains how a linear dashboard view of logs that aligns with SaaS and PaaS providers can lead to more effective cybersecurity investigations.
John Siefert, Wayne Sadin, Chris Hughes, and John Muehling discuss why data modernization needs require C-suite execs to collaborate.
Acceleration Economy analyst Chris Hughes breaks down the latest findings from Sysdig’s 2023 Cloud-Native Security and Usage report.
Wayne Sadin delves into the advantages of cloud migration and why CTOs should make it a priority.
ServiceNow plans to integrate technology from Snyk, a Cybersecurity Top 10 company, into ServiceNow’s vulnerability response platform.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
Bill Doerrfeld explains how to effectively manage diverse, geographically specific data governance and compliance standards.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
In this Cybersecurity Minute, Robert Wood explains how to integrate threat modeling solutions into cybersecurity solutions to manage risks.
Leonard Lee defines what SASE is and puts it in the context of edge-computing. He describes the five core capabilities of SASE and lists key takeaways for the C-suite.



















