In the News
-
A.I. safety bill passes CA Senate, headed to Governor’s desk
If the bill becomes state law, only A.I. developers who produce large-scale A.I. models with computing power valued over $100 million will…
-
AppOmni State of SaaS Security Report 2024 Finds Security Of Enterprise SaaS Applications Is Still Far Short of Ideal
AppOmni releases its latest SaaS security report that analyzes half of the 644 organizations with 2,500-plus employees spanning across multiple security roles.
-
SaaS data breaches are on the rise: report
SaaS security incidents are on the rise. An August 27 report by AppOmni stated that 31% of organizations said they experienced a…
-
SaaS Apps Present an Abbreviated Kill Chain for Attackers
In many of the attacks that AppOmni analyzed, adversaries gained access to an organization’s SaaS applications through an externally facing identity provider.…
-
How cloud services, SaaS, can add vulnerabilities to cybersecurity
“Hackers are attacking the cloud because we’re not monitoring it,” said Brendan O’Connor, CEO of cybersecurity company AppOmni. “Businesses moved so quickly…
-
AppOmni Announces SaaS-Aware Identity Threat Detection and Response (ITDR)
Read the latest announcement on AppOmni’s addition of SaaS-Aware Identity Threat Detection and Response (ITDR) to its SaaS security platform.
-
AppOmni Brings Aboard Industry Veteran Joel Wallenstrom
Joel Wallenstrom, AppOmni’s new General Manager, aims to make AppOmni the top choice for business-critical SaaS security.
-
Achieving Zero-Trust Cybersecurity with AppOmni’s Brian Soby
Learn why achieving and maintaining zero-trust cybersecurity needs to go well beyond simple identity management. Watch Techstrong.tv
-
The NSA Releases Guidance on Achieving Zero Trust Security Maturity
AppOmni CTO and co-founder, Brian Soby, quoted in DevProJournal: “NSA’s guidance on the Application and Workload Pillar is essentially calling out a…
-
With native tools, cyberattackers evade detections
AppOmni CTO and co-founder, Brian Soby, quoted in ITBrew on how attackers use native capabilities to search for vulnerabilities in environments.