Is auditing SaaS permissions a time sink?

For most, SaaS privileged access audit is a manual and resource-intensive process. Painful to do, it doesn’t get done frequently enough.

Continue Reading

Misconfigured Zendesk is a perfect recipe for a customer impacting breach

A popular platform to manage customer relationships for over 100,000 businesses, it is common to find customers’ PII and financial data in Zendesk accounts. This coupled with the fact that Zendesk is often managed by customer support teams with a high staff turnover makes it a perfect recipe for a data breach.

Continue Reading

Preventing Zoombombing and unauthorized data sharing on Zoom

After Zoom’s recent negative publicities, you would have known by now anyone could bomb a Zoom call, share sensitive screens and files in a call, if you don’t have the right security settings enabled.

Continue Reading

What are teams using Slack for?

Team chat is just the mean. Business teams use Slack as a repository of confidential data and files which can be shared easily, often without security considerations. As Slack owners and admins can enable users to perform many data sharing functions, misconfiguration of permission and security controls can lead to data breaches.

Continue Reading

Securing cloud data while employees work from home

With the spread of COVID-19, today WHO declared it a pandemic. This has caused most businesses to reevaluate their business continuity plans and often add “Work from home” as a contingency option, which has caused IT and security teams to hastily deploy this capability for their organisation.

Continue Reading

Detexian at Maryland RSA pitch competition

bwtech@UMBC and the Maryland Department of Commerce, invites you to see Detexian deliver a three minute product pitch at RSA.

Continue Reading

Detexian at RSA Conference 2020

How do you help business teams use their SaaS securely at all times?

Come hear Detexian’s unique take on SaaS security

Continue Reading

What is a good baseline security policy for SaaS apps?

At Detexian, we often get asked this question. When it comes to security posture for SaaS, there’s a lot of ambiguity as every SaaS is unique in its security configuration.

Continue Reading

How has your Information Security Policy coped with the rise of SaaS solutions?

According to McKinsey & Co, the “next normal” established during the COVID-19 pandemic will accelerate the footprint of SaaS.

Continue Reading

Eliminate SaaS risk blind spots
710 Collins Street
Melbourne VIC 3008
9848 Mercy Rd #2
San Diego 92129

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2021 All Rights ReservedTerms & ConditionsPrivacy Policy