Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SSO isn't a complete solution for SaaS access management

This blog has been adapted from an excerpted section of 1Password’s ebook: Why SSO is not enough for identity security. To read the complete ebook and learn more about the issues that SSO can’t cover, click here. Sign-on (SSO) solutions are designed to manage and secure access to applications. By integrating with a company’s identity provider (IdP), SSO allows users to authenticate to multiple applications via a single log-in.

CrowdStrike Named a Frost Radar Leader in Cloud and Application Runtime Security

CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud runtime protection.

Logistics Industry: Boosting Operational Efficiency with User Activity Monitoring (UAM)

The Logistics Industry is a true example of a distributed workforce that needs operational efficiency and clear visibility to achieve its goals. You have drivers on the road, operators working on a factory line to build, and your goal is to maintain operational excellence, safeguard data, and ensure regulatory compliance. This is no easy task without the right technology in place to help you.

Smarter Security Assessments: Automate, Customize, Scale

Discover how AI is transforming third-party risk management. In this update, Michelle from our Customer Success team walks through key improvements to AI-Assessments—from instant Security Profiles and smarter questionnaires to faster reporting and risk remediation. See what’s live, what’s coming next, and how your feedback is shaping the future of vendor risk. Interested in finding out more about UpGuard?

Comprehensive Guide to Implementing Asset Monitoring Solutions

Are you seeking support to avoid unexpected asset malfunctions? Companies utilize asset monitoring solutions to maintain equipment operations without disruptions while protecting against costly downtime periods and extending the life of important infrastructure. Here's the good news... These solutions implement more easily than anticipated but yield substantial advantages. Our guide demonstrates all necessary steps to establish an efficient asset monitoring system for your business.

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

Today, SquareX released new threat research on an advanced Browser-in-the-Middle (BitM) attack targeting Safari users. As highlighted by Mandiant, adversaries have been increasingly using BitM attacks to steal credentials and gain unauthorized access to enterprise SaaS apps. BitM attacks work by using a remote browser to trick victims into interacting with an attacker-controlled browser via a pop-up window in the victim's browser.

Protecting Government Agencies From Mobile Threats: A Guide

If you work for (or alongside) the United States government, then threat actors want your sensitive data. In 2023, federal agencies fell victim to 11 major cybersecurity incidents, with threats continuing to evolve well into 2024. Safeguarding federal and critical infrastructure organizations requires a modern cybersecurity framework. In today’s mobile-enabled workplaces, that means extending your data protection strategy to wherever devices are being used.

Known vs. Unknown Risks: The Role of the Enterprise Risk Retainer in Preparing for the Future

Preparing for risk is critical to ensuring organizational resilience, but what about the risks that can’t be planned for? Businesses frequently fall into the trap of strategizing only for known risks—those that are easily anticipated—while failing to recognize their blind spots in relation to unknown risk events.

How the CDM Program Strengthens Federal Cyber Resilience

For most organizations, a data breach can be catastrophic, resulting in loss of trust and revenue, and maybe even steep fines and penalties. When you add in a potential threat to national security, that breach becomes far more dangerous. That’s why the United States Department of Homeland Security implemented the Continuous Diagnostics and Mitigation (CDM) Program, which has become a cornerstone of federal cybersecurity.