Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
SaaS Insecurity: How to Regain Control
Published: 10/20/2021

By Andrew Sweet, AppOmni. Is your SaaS environment running? Then you better go catch it! Or, better yet, secure it. Jokes aside, it’s common knowledge these days that SaaS environments are popular for their agility and scalability, helping businesses streamline operations, improve customer...

Building A SaaS Security Program: A Quick Start Guide
Published: 09/28/2021

Written by Bryan Solari, AppOmni Every few years a new technology takes hold of businesses worldwide, expanding adoption at a speed that far outpaces our ability to secure it. Inevitably, the security shortfalls of this technology become known, and we build risk mitigation strategies that mel...

What are the Most Common Cloud Computing Service Delivery Models?
Published: 08/24/2021

This blog was originally published by Alert Logic here.Written by Angelica Torres-Corral, Alert Logic.Cloud computing has transformed the way companies use technology, and your organization stands to gain a lot from migrating to a cloud solution. But which service delivery model is right for you...

SaaS Security: Risks and Mitigation Methods
Published: 08/16/2021

Written by Dipen Rana and Pooja Patil, TCS As a pandemic-triggered hybrid work model settles in, many enterprises are moving onto the cloud for better agility and greater efficiency. With the cloud offering subscription-based models and eliminating infrastructure cost, organizations have the flex...

​CSA STAR Attestation and STAR Certification Case Studies
Published: 02/28/2021

As organizations look to cloud services to process more sensitive and critical data, security and risk management teams require tools to quickly assess and understand the types and rigor of security controls applied by cloud service providers. The CSA STAR Attestation and Certification are the fi...

Cloud Security for SaaS Startups Part 1: Requirements for Early Stages of a Startup
Published: 02/19/2021

Based on the Cloud Security for Startups guidelines written by the CSA Israel ChapterBackground Information security is a complicated subject even for mature enterprises, so it’s no wonder that startups find the area challenging. Planning, implementing and maintaining good-practice security are n...

How to avoid the biggest mistakes with your SaaS security
Published: 02/08/2021

This blog was originally published on Wandera.comWritten by Alex Powell at WanderaThe biggest mistakes in SaaS securityThe popularity of SaaS applications for businesses continues to grow with 95% of businesses hosting sensitive information in the cloud. Traditional security models and boundary-f...

Security Policies | Q&A with TokenEx Industry Experts
Published: 12/10/2020

Contributed by TokenExSecurity Policies | What You Need to KnowWhat is a Security Policy?Security policies are internal frameworks that formally document an organization’s requirements for the safe handling of sensitive information and assets. Effective security policies tend to be developed for ...

Securely Implementing Salesforce as a IdP in a Multi-Org Architecture
Published: 12/09/2020

Written by Aaron Costello is an Offensive Security Engineer at AppOmniBy focusing on streamlining access to applications and services, most enterprises have deployed tooling that allows consolidated login for quicker access to the resources their employees need to accomplish their day-to-day job ...

6 Data Governance Best Practices in 2020
Published: 10/27/2020

By Dillon Phillips from TokenExData governance is an essential practice in today’s digital landscape, but it's a broad topic that needs to be deeply understood in order to be implemented efficiently and effectively. Building on the information we introduced in our previous post (“What is Data Gov...

Data Privacy vs. Data Security: What is the Core Difference?
Published: 10/20/2020

This blog was originally published on TokenEx.Written by Dillon Phillips from TokenExFor organizations that collect or manage data—and individuals who own it—private data and the security of that data should not be taken lightly. They are primary concerns when undertaking the process of protectin...

How secure are your SaaS applications?
Published: 10/19/2020

Written by Ian Sharpe, Product Leader at AppOmni The dynamic nature of protecting the enterprise technology stack has always been a challenge for security teams. The complexities of this year, however, have forced teams to consider a new set of paradigms and additional risks given the abrupt shif...

Improving Data Security for SaaS Apps - 5 Key Questions every CISO needs to ask
Published: 10/06/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloud Summary: The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before COVD-19 emerged and the remote workforce exploded overn...

SaaS Security Series: Understanding Salesforce Administrative Permissions
Published: 08/19/2020

Brian Soby, CTO & Co-founder of AppOmniToday, more than ever, SaaS applications drive the modern enterprise. They are relied upon for managing customer data, allowing internal collaboration, and keeping organizations connected across the world. As the amount of sensitive and business-critical...

How Hackers Changed Strategy with Cloud
Published: 07/21/2020

By Drew Wright, Co-Founder of FugueOriginally published June 30, 2020 on you’re running a workload in the cloud, take a moment to look at the activity logs for your public-facing resources. There’s bad guys there, and they’re probing your cloud infrastructure looking f...

Browse by Topic
Write for the CSA blog
Submit your blog proposal