Resources

SANS First Look-Thumbnail

SANS First Look: Third-Party API Security with Vorlon

Download Now

Lessons Learned: Navigating the 2023 Data Breach Landscape

Lessons Learned: Navigating the 2023 Data Breach Landscape

Navigating The Risks and Rewards of Third-Party Apps

Navigating The Risks and Rewards of Third-Party Apps

Thumbnail - 10 Questions to Ask About API Activity-1-1

10 Questions to Ask About API Activity

Vorlon Spin Cycle Guide Hero

Spin Cycle Security: Rotating Credentials

Explaining the Challenge of Third-Party APIs
CISO Sound Bites: Eric Richard (03:00)
Vorlon Product Overview
CISO Sound Bites: Eric Richard (00:45)
What Is Non-Human Identity? NHI Security Threats and Management

What Is Non-Human Identity? NHI Security Threats and Management

| August 19, 2025

Digital identities are the backbone of modern IT infrastructure. Most security frameworks are built to manage people, such as authenticating users,..

Read More

ShinyHunters group image from social and salesforce logo connected with an alert sign

ShinyHunters Exploits Salesforce, Detection and Response Tips

| August 12, 2025

A coordinated cyberattack campaign targeting Salesforce integrations has compromised data at several major global brands, including Google, Chanel,..

Read More

Justin Lam’s SSPM Reality Check: Secure the Ecosystem, Not Just the App

| August 6, 2025

Why every CISO needs to read this SaaS usage isn’t just growing; it’s become the backbone of modern enterprises' operations, from development..

Read More