CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
SaaS
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

SaaS

Business women using cloud technology showing SaaS shared responsibility model
Cyber SecurityInsights

Are You Aware of the Shared Responsibility Model? The SaaS Data Loss Risk You Might Not Know You’re Taking

December 29, 2022
SaaS vendors are responsible for ensuring the security of their cloud environments, but each customer is responsible for securing their data in those clouds. The best way to secure assets such as business-critical data on the cloud is an account-level backup and recovery tool.
Read More
Businessman using notebook showing SaaS and shadow IT
Cyber SecurityInsights

Software May Be Eating the World and Your IT Budget

December 13, 2022
The economic landscape requires due diligence when it comes to enterprise level SaaS spending. Shadow IT hides wasteful spending, and organizations must manage costs associated with bulky and hidden SaaS platforms.
Read More
Man working on laptop with virtual lock showing zero trust for SaaS
Cyber SecurityInsights

How Zero Trust Secures Business-Critical SaaS Application Data

December 8, 2022
The time is now for business leaders to implement zero-trust protocols to address cloud misconfigurations beyond the identity layer and into the SaaS app ecosystem, as doing so has become critical for organizations to be able to maintain a good security posture. Zero Trust Data Access (ZTDA) does just that.
Read More
Close up of hand pointing at tablet with abstract cloud hologram showing SaaS security
Cyber SecurityInsights

The “Ghost SaaS” Threat and Why Security Teams Should Take It Seriously

June 1, 2022
Security teams need to be vigilant - both on what SaaS services employees are connecting to, and whether those platforms are safe and remains safe for use in the organization.
Read More
Finger touching tablet showing SaaS and information assets
Cyber SecurityInsights

This is What We Mean by Protecting Crown Jewels

April 14, 2022
Our reliance on SaaS across every facet of contemporary business operations has extended accessibility to nearly all enterprise resources. It is critical to properly acknowledge this shift to mitigate the full extent of risk this represents.
Read More
Hand on keyboard with cloud icon on monitor screen showing SaaS and shadow IT
Cyber SecurityInsights

Shadow SaaS Is on the Rise in the Hybrid Work Era; Here’s How To Regain Control

July 29, 2021
IT security teams need to develop a SaaS management strategy to mitigate and address their shadow applications to mitigate the security and compliance risks shadow IT poses to their organizations.
Read More

Latest

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

Man pointing at HR icons showing AI use in HR processes

AI in HR – How To Make Use of the New Hype in a Compliant Manner

Privacy’s Shifting Left: Are You Ready To Move?

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results