Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault
28 May - 30 minsWith hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, “How do you enable the business while still providing security oversight and governance?”
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
CISOs encounter challenges in securing data amidst the rapid growth driven by Cloud and GenAI applications. In this...
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3 hours 6 mins
24 October Finished
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29 mins
22 October Finished
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1 hour 1 min
22 October Finished
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1 hour 17 mins
21 October Finished
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33 mins
18 October Finished
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1 hour 46 mins
18 October Finished