CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
SaaS
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

SaaS

Hand using smartphone showing SaaS models and third-party security
Cyber SecurityNews

JPMorgan Chase CISO Warns Security of SaaS Models is Unsustainable, Third-Party Security Must Improve to Prevent Catastrophe

May 6, 2025
Opet notes that the SaaS model is usually the default option for whatever software a company might need, and often is the only option available. That means a global concentration of risk such that numerous third-party security breaches could cascade.”
Read More
Padlock with fingerprint icon showing CISOs and SaaS
Cyber SecurityInsights

How CISOs Can Cope With the Information Decentralization Era

June 23, 2023
While SaaS increases business efficiency, it also represents a significant challenge for CISOs, who now have less direct control over their organizations’ data, including business information, proprietary information, and even employee data, that is now overwhelmingly in various SaaS systems.
Read More
Businessman touching virtual screen with lock showing SaaS and shadow IT
Cyber SecurityInsights

The New Shadow IT – The Importance of Having Visibility Into Your SAAS Usage

May 3, 2023
SaaS applications are not going anywhere, and we must face the fact that they have access to our company’s most sensitive data. With SaaS, the shadow IT challenge has expanded and deepened even further.
Read More
Cloud icon with lock and data flow showing SaaS backup
Cyber SecurityInsights

Why Backing up SaaS Is Necessary

April 24, 2023
SaaS solutions are widely used and are mission-critical for their users. As such, they should be treated with the utmost importance, just like their mission-critical non-SaaS business applications. Solutions are now available for vendor-agnostic SaaS backup.
Read More
Business women using cloud technology showing SaaS shared responsibility model
Cyber SecurityInsights

Are You Aware of the Shared Responsibility Model? The SaaS Data Loss Risk You Might Not Know You’re Taking

December 29, 2022
SaaS vendors are responsible for ensuring the security of their cloud environments, but each customer is responsible for securing their data in those clouds. The best way to secure assets such as business-critical data on the cloud is an account-level backup and recovery tool.
Read More
Businessman using notebook showing SaaS and shadow IT
Cyber SecurityInsights

Software May Be Eating the World and Your IT Budget

December 13, 2022
The economic landscape requires due diligence when it comes to enterprise level SaaS spending. Shadow IT hides wasteful spending, and organizations must manage costs associated with bulky and hidden SaaS platforms.
Read More
Man working on laptop with virtual lock showing zero trust for SaaS
Cyber SecurityInsights

How Zero Trust Secures Business-Critical SaaS Application Data

December 8, 2022
The time is now for business leaders to implement zero-trust protocols to address cloud misconfigurations beyond the identity layer and into the SaaS app ecosystem, as doing so has become critical for organizations to be able to maintain a good security posture. Zero Trust Data Access (ZTDA) does just that.
Read More
Close up of hand pointing at tablet with abstract cloud hologram showing SaaS security
Cyber SecurityInsights

The “Ghost SaaS” Threat and Why Security Teams Should Take It Seriously

June 1, 2022
Security teams need to be vigilant - both on what SaaS services employees are connecting to, and whether those platforms are safe and remains safe for use in the organization.
Read More
Finger touching tablet showing SaaS and information assets
Cyber SecurityInsights

This is What We Mean by Protecting Crown Jewels

April 14, 2022
Our reliance on SaaS across every facet of contemporary business operations has extended accessibility to nearly all enterprise resources. It is critical to properly acknowledge this shift to mitigate the full extent of risk this represents.
Read More
Hand on keyboard with cloud icon on monitor screen showing SaaS and shadow IT
Cyber SecurityInsights

Shadow SaaS Is on the Rise in the Hybrid Work Era; Here’s How To Regain Control

July 29, 2021
IT security teams need to develop a SaaS management strategy to mitigate and address their shadow applications to mitigate the security and compliance risks shadow IT poses to their organizations.
Read More

Latest

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Unlocked digital lock showing cyber attack on UK retailer

Harrods Hit in Third Cyber Attack Targeting a UK Retailer

Fingerprint on device showing passwordless for Microsoft accounts

Microsoft Makes All New Accounts Passwordless As of May 1, Pushes Biometric Passkeys

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results