Resources
White Papers & Guides

Lessons Learned: Navigating the 2023 Data Breach Landscape

Navigating The Risks and Rewards of Third-Party Apps

10 Questions to Ask About API Activity

Spin Cycle Security: Rotating Credentials
Video
Explaining the Challenge of Third-Party APIs
CISO Sound Bites: Eric Richard (03:00)
Vorlon Product Overview
CISO Sound Bites: Eric Richard (00:45)
Blogs

What Is Non-Human Identity? NHI Security Threats and Management
| August 19, 2025
Digital identities are the backbone of modern IT infrastructure. Most security frameworks are built to manage people, such as authenticating users,..

ShinyHunters Exploits Salesforce, Detection and Response Tips
| August 12, 2025
A coordinated cyberattack campaign targeting Salesforce integrations has compromised data at several major global brands, including Google, Chanel,..

Justin Lam’s SSPM Reality Check: Secure the Ecosystem, Not Just the App
| August 6, 2025
Why every CISO needs to read this SaaS usage isn’t just growing; it’s become the backbone of modern enterprises' operations, from development..