Home
Blog
FrontierZero's Blog
Technical and non-technical posts concerning cloud and SaaS security
All Stories
Are Shadow Apps Stealing Your Business Data?
Introduction
Why Your Company Insurance May Be Invalid Without 2FA
Introduction
A Deep Dive into SaaS Cloud Applications: Usage and Risks
In today’s fast-paced corporate environment, the widespread adoption of Software as a Service (SaaS) cloud applications has revolutionized the way businesses operate. These versatile solutions have become indispensable tools for...
VPNs in Remote Work: Safeguarding Security Amidst Challenges of Throttling and Censorship
Introduction
Selecting the Appropriate Access Control Context for Your Applications: A Guide to Making the Right Choice
An Access Control Context refers to the specific set of circumstances and factors that are considered when making access control decisions.
Unseen Threats: The Hidden Dangers of Orphaned Accounts
What are Orphaned Accounts?
« Prev
1
2
3
4
Next »
Never miss a
story
from us, subscribe to our newsletter
Explore
→
management (2)
risk (11)
technical (1)
access (3)
control (2)
authentication (2)
insurance (1)
data security (1)
thirdparty (1)
cost (3)
cost optimization (1)
saas (9)
mfa (3)
shadowIT (1)
security (6)
2fa (3)
shadow (2)
itdr (1)
threat-detection (1)