As SaaS applications grow more complex, so does the network of SaaS-to-SaaS integrations and the non-human identities (NHIs)—such as service accounts, API keys, and OAuth tokens—that power them. Learn about NHI risks and security best practices.
While SaaS applications have become essential to modern business operations, they also introduce unique security challenges. To address these issues, SaaS Security Posture Management (SSPM) has emerged as a critical solution.
Read about Valence's new integration with Cyera, a leader in Data Security Posture Management (DSPM). Combining Valence’s SSPM capabilities with Cyera’s insights around sensitive data, improving SaaS risk management.
Artificial Intelligence (AI) tools have revolutionized the business landscape, offering unprecedented automation, efficiency, and innovation. Among these, Generative AI (GenAI) has gained particular traction...
The recent attacks targeting data in customers of Snowflake, a SaaS application focused on data storage, serve as a critical reminder of the importance of understanding the Shared Responsibility Model...
The report explores key challenges, potential risks, and best practices to navigate the modern SaaS security landscape.
Explore Microsoft's recent revelation on the Midnight Blizzard cyber attack, uncovering nation-state tactics, SaaS misconfigurations, and crucial lessons for enhancing your organization's cybersecurity.
Valence is excited to partner with CrowdStrike, to empower security teams to protect their growing endpoint-to-SaaS risk surface. The integration correlates SaaS security risk signals with CrowdStike’s endpoint security signals to improve overall security posture, threat detection, and incident response processes.
While breaches remain a common occurrence, there's much to gain from studying them to avert future incidents. In this blog post, we delve deep into the most recent Okta Support Breach, extracting five crucial lessons from it.
As organizations increasingly migrate to the cloud, the rapid adoption of both SaaS and IaaS solutions has created new challenges. Valence's collaboration with Orca Security addresses these challenges head-on, creating a powerful solution that bridges the gap between cloud and SaaS security posture management.
We hear a lot about attackers exploiting vulnerabilities, but did you know that misconfigurations are just as common? In this blog, we delve into the realm of common misconfigurations and provide insights on how to proactively prevent them.
On June 16, 2023, a Microsoft 365 customer alerted Microsoft to some anomalous email activity they had detected. Microsoft began investigating and found that an external adversary had compromised the email of 24 other customers as well.
Over the holiday weekend, the popular messaging app vendor Slack was notified of a breach of their GitHub account.