{"id":1116735,"date":"2023-07-31T20:30:21","date_gmt":"2023-08-01T00:30:21","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/strengthening-security-in-a-multi-saas-cloud-environment-techcrunch\/"},"modified":"2023-07-31T20:30:21","modified_gmt":"2023-08-01T00:30:21","slug":"strengthening-security-in-a-multi-saas-cloud-environment-techcrunch","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloud-computing\/strengthening-security-in-a-multi-saas-cloud-environment-techcrunch\/","title":{"rendered":"Strengthening security in a multi-SaaS cloud environment &#8211; TechCrunch"},"content":{"rendered":"<p><p>Steven Tamm is a technology adviser to Spin.AI and a former Salesforce CTO        with extensive experience in cloud computing, e-commerce,        virtualization, developer tools, cybersecurity, compliance        and SaaS.              <\/p>\n<p>    Managing security    across multiple SaaS cloud deployments is becoming more    challenging as the number of zero-day and ransomware attacks    continues to rise. In fact, recent research reveals that a    staggering 76% of organizations fell    victim to a ransomware attack in the past year.  <\/p>\n<p>    Its no secret that protecting data is hard, and with the rise    of cloud technologies, its becoming harder. But when it comes    to cloud SaaS application risk, what does that look like? And    what actionable steps can teams and IT pros take to help    mitigate those risks at their organization? In this article,    Im going to explore those questions and provide some insights.  <\/p>\n<p>    Modern organizations encounter a variety of SaaS challenges,    including the absence of configuration standards, multiple    APIs, and user interfaces (UIs) with varying access levels and    potential data leaks across interconnected systems. Securing    structured data in CRM applications, communication data in    messaging platforms, and unstructured data from file providers    is already difficult.  <\/p>\n<p>    However, when these systems are sourced from different vendors,    it becomes even more challenging to detect and prevent attacks    in a timely manner. The interconnected nature of these systems    makes tracking data provenance difficult and facilitates broad    spread of malware and ransomware.  <\/p>\n<p>    This challenge is further exacerbated when organizations extend    their systems to include external users. With expanding    footprints, the inadvertent leakage or destruction of sensitive    data becomes a significant concern. Popular platforms like    Salesforce Communities, Slack Connect, Microsoft Teams,    Microsoft 365, and Google Drive create a complex web of    identity, permissions, and integration controls.  <\/p>\n<p>    Unfortunately, most endpoint management tools on the market    were designed for a pre-cloud, pre-bring-your-own-device (BYOD)    era, making them inadequate for managing the modern SaaS    landscape. So how do you take control?  <\/p>\n<p>    When managing risk in the cloud, its crucial to select IT and    security solutions that truly address the intricacies of the    deployed SaaS applications and were born 100% in the cloud    without any legacy on-premises components. The good news is    that vendors are developing innovative solutions to help IT and    security teams do this. But its essential to explore the    options and consider the following:  <\/p>\n<p>    First, do they go beyond basic factors such as OAuth scopes,    login IP addresses, and high-level scores, and instead delve    deeper into data usage patterns and even examine the code of    all integrations?  <\/p>\n<p>    Second, many major SaaS vendors provide event monitoring,    antivirus protection, and basic data leak prevention as check    boxes. But these features often fall short when it comes to    preventing and remediating data attacks because of    miscalibrated thresholds in alert systems and logs that are not    tuned for specific organizations. That results in alert    overload and fatigue. Its important to understand how a    solution improves risk scoring and alert prioritization.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/techcrunch.com\/2023\/07\/31\/strengthening-security-in-a-multi-saas-cloud-environment\" title=\"Strengthening security in a multi-SaaS cloud environment - TechCrunch\">Strengthening security in a multi-SaaS cloud environment - TechCrunch<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Steven Tamm is a technology adviser to Spin.AI and a former Salesforce CTO with extensive experience in cloud computing, e-commerce, virtualization, developer tools, cybersecurity, compliance and SaaS. Managing security across multiple SaaS cloud deployments is becoming more challenging as the number of zero-day and ransomware attacks continues to rise <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloud-computing\/strengthening-security-in-a-multi-saas-cloud-environment-techcrunch\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257743],"tags":[],"class_list":["post-1116735","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1116735"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1116735"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1116735\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1116735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1116735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1116735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}