What’s the recommended number of highly privileged users for Office 365, G Suite, Atlassian, GitHub?


When people think of excessive privileges, SaaS solutions are rarely on their mind. Many organizations end up with excessive numbers of highly privileged users in SaaS solutions.

Continue Reading

Is auditing SaaS permissions a time sink?


For most, SaaS privileged access audit is a manual and resource-intensive process. Painful to do, it doesn’t get done frequently enough.

Continue Reading

Misconfigured Zendesk is a perfect recipe for a customer impacting breach


A popular platform to manage customer relationships for over 100,000 businesses, it is common to find customers’ PII and financial data in Zendesk accounts. This coupled with the fact that Zendesk is often managed by customer support teams with a high staff turnover makes it a perfect recipe for a data breach.

Continue Reading

Preventing Zoombombing and unauthorized data sharing on Zoom


After Zoom’s recent negative publicities, you would have known by now anyone could bomb a Zoom call, share sensitive screens and files in a call, if you don’t have the right security settings enabled.

Continue Reading

Eliminate SaaS risk blind spots

710 Collins Street
Melbourne VIC 3008
9848 Mercy Rd #2
San Diego 92129

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2020 All Rights ReservedTerms & ConditionsPrivacy Policy