What is Shadow IT? The underbelly of IT management

What is Shadow IT? The underbelly of IT management

When managing your business' cybersecurity, the majority of your risk reduction will come from unanimous security measures. Whether it's password policies, security awareness training or SaaS app hardening, the best way to reduce your risk is to ensure that appropriate risk-reduction processes are implemented throughout the entire organization.

Read More
Cross-SaaS contamination: How to prevent unauthorized access to your organization

Cross-SaaS contamination: How to prevent unauthorized access to your organization

Over the past five years, the average SaaS usage in global organizations has grown exponentially. Whereas it's estimated that an average 16 SaaS applications were used per organization in 2017, research dictates a whopping increase of this average to 110 SaaS applications in 2021.

While this number is subject to change according to a myriad of factors, such as industry, size-of-operations, and the number of staff in an organization, it's apparent that SaaS security is a rampantly growing concern for any modern business.

Read More
Security with benefits

Security with benefits

Need to justify the budget to monitor SaaS applications? Look no further. Introducing security with benefits. With Detexian you can save money on SaaS licencing while reducing risks to your organization.

If your team is responsible for user onboarding / offboarding and keeping track of who’s got what access to which SaaS apps in your organisation, you know it’s a pain in the ass and things get missed.

Read More
Too much work auditing your SaaS apps?

Too much work auditing your SaaS apps?

In modern workplaces, SaaS is procured and managed by business people.

While IT has visibility into core applications such as Office 365, G Suite, Slack and Zoom, they won’t know how other sensitive data bearing SaaS apps like Salesforce, JIRA, GitHub, Xero and Slack workspaces are managed by the various other business teams.

Read More
Cyber Risk Management - Trust but verify

Cyber Risk Management - Trust but verify

A key activity in setting up any new relationship with a third party is to assess any cyber risks to decide whether it is safe to proceed. A cyber risk assessment also ensures that both parties can agree on terms and conditions in any agreements related to managing cybersecurity risks.

In the world of cyber risk management, this means getting some proof that sound security management practices are in place.

Read More
Why SSPM is becoming an integral part of risk management for every business

Why SSPM is becoming an integral part of risk management for every business

SaaS Security Posture Management (“SSPM”) is a new Gartner category defined as “tools that continuously assess the security risk and manage the security posture of SaaS applications.”

Core capabilities include reporting the configuration of native SaaS security settings and offering suggestions for improved configuration to reduce risk. Optional capabilities include comparison against industry frameworks and automatic adjustment and reconfiguration.

Read More
Founder Introduction: Andy Budiman
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Founder Introduction: Andy Budiman

Detexian is not my first rodeo in a start-up. Back in 1999 after only 1 year from Design college graduation, I started my own business in web design and development in Perth, Australia. It was during the dot com boom, I was way too confident back then, thinking that it would be a walk in a park and in a way, for the first few years or so, it did feel like that.  Armed with a design award that I won and multiple job offers from interstate and overseas, my ego was at an all-time high, I thought I knew it all.

Read More
Solidifying customer confidence in security due diligence

Solidifying customer confidence in security due diligence

If you’re a B2B business looking to or already supplying to large organisations, you will probably have noticed an uptick in the number of questions and the “proof” of information security controls asked of you for systems that host business critical and customer sensitive data.

These are not difficult questions to answer but can be very time consuming. However, your reputation may be on the line over time if you fail to provide proof to your customers that internal information security management systems (ISMS) you said you have are actually enforced.

Read More
Founder Introduction: Adrian Kitto
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Founder Introduction: Adrian Kitto

Before I co-founded Detexian as the CTO, I had a long career in Information Technology which started onboard HMNZS Te Kaha as an Electronics Technician. Working on classified equipment at sea was my first exposure to both security and doing things right the first time, a mantra I still live by today.

Read More