SECURITY ALERT:

OAuth abuse: lessons from the Salesloft-drift breach

  • Login
  • Contact Us
CheckRed Security logo
  • Home
  • Platform
        • SSPMProtect your SaaS applications from security risks
        • DNSPMFull visibility & control over all DNS providers
        • CSPMDetect security misconfigurations in your cloud
        • CIEMSafeguard your cloud identities and entitlements
        • Continuous ComplianceAchieve regulatory compliance with custom frameworks
        • IntegrationsImprove collaboration with our integration capabilities
        • CWPPProtect all layers of your cloud workloads
        • CNAPPSecure 100% of your cloud with a single platform
        • KSPMSecure all your Kubernetes clusters
        • ADPMDetect Active Directory vulnerabilities
        • Identity PostureGovern all identities – human & non-human
        • ITDRReal-time SaaS identity threat detection & response
  • Solutions
        • SaaS Apps

        • Microsoft 365
        • Salesforce
        • ServiceNow
        • Okta
        • Other Supported Apps
        • Cloud Apps

        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
        • Akamai Linode
        • Multi-cloud
  • Use Cases
        • By Capability

        • 360° Asset Visibility
        • Misconfiguration Assessment
        • Identity and Access Management (IAM)
        • 3rd Party App Management
        • Alert Prioritization
        • Guided Remediation
        • Continuous Compliance Assessment
        • By Industry

        • Finance
        • Healthcare
        • MSSP
        • Technology
        • Other
        • By Role

        • CISO
        • CIO
        • CTO
        • Analysts
  • Resources
    • Blog
    • White Papers
    • Use Cases
    • Case Studies
    • Datasheets
    • In The News
  • Company
    • About Us
    • Testimonials
    • Careers
    • Contact Us
    • Partner login
  • Partners
  • Get a Demo
  • Login
  • Contact Us

Blog

Back To All Resources
Prioritizing risk and security posture of technology infrastructure during M&A

Prioritizing risk and security posture of technology infrastructure during M&A

Feb 27, 2024

Mergers and acquisitions (M&A) have always been a prevailing strategy in almost every business sector. The financial...

read more
Demonstrating the need for cloud security to your clients

Demonstrating the need for cloud security to your clients

Feb 22, 2024

Moving to the cloud offers businesses scalability, agility, and cost-effectiveness. It allows companies to grow without the...

read more
Are you keeping your customers safe from data breaches?

Are you keeping your customers safe from data breaches?

Feb 19, 2024

Today, data security is a primary concern for Managed Service Providers (MSPs) and Managed Security Service Providers...

read more
CSPM and SSPM – The value they provide for managed security

CSPM and SSPM – The value they provide for managed security

Feb 15, 2024

The proliferation of cloud environments has brought undeniable benefits, but with them, complex security challenges....

read more
Proactive vs reactive incident response for MSPs and MSSPs

Proactive vs reactive incident response for MSPs and MSSPs

Feb 12, 2024

Incident Response (IR) refers to the structured process of identifying, containing, and mitigating cybersecurity threats...

read more
Agentless scanning – Why it benefits managed cloud security

Agentless scanning – Why it benefits managed cloud security

Feb 5, 2024

The dynamic nature of cloud environments presents a growing challenge for MSPs and MSSPs. These entities play a pivotal...

read more
Getting the most out of security risk dashboards – A guide for MSPs and MSSPs

Getting the most out of security risk dashboards – A guide for MSPs and MSSPs

Jan 25, 2024

In cybersecurity, security risk dashboards are crucial tools for Managed Service Providers (MSPs) and Managed Security...

read more
Insider threats – a risk for MSPs and MSSPs

Insider threats – a risk for MSPs and MSSPs

Jan 22, 2024

In the Information Technology sector, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) play...

read more
Greater spend does not always equal better security posture

Greater spend does not always equal better security posture

Jan 18, 2024

As organizations increasingly migrate to cloud environments, the responsibility for digital defense falls squarely on the...

read more
Page 9 of 14First Page← Prev...7891011...Next →Last Page
CheckRed Security logo

Inspect misconfigurations. Meet compliance requirements. Analyze risks.
An all-in-one platform for cloud, SaaS and DNS security!

Follow us on

  • Platforms
    • SSPM
    • DNSPM
    • CSPM
    • CIEM
    • CWPP
    • CNAPP
    • ITDR
    • Continuous Compliance
    • Integrations
  • SaaS Security
    • Microsoft 365
    • Salesforce
    • ServiceNow
    • Okta
    • Other Supported Apps
  • Cloud Security
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Google Cloud
    • Akamai Linode
    • Multi-cloud
  • Company
    • About Us
    • Careers
    • Contact Us
    • Resources
    • Support
Top Infosec Awards certification logo
Top Infosec Awards
SOC 2 Compliant certification logo
SOC 2 Compliant
 ISO 27001 Certified certification logo
ISO 27001 Certified
 CSA Member
CSA Member
 CSA Member
Star Level 1
© 2025 CheckRed. All Rights Reserved.
  • Privacy Policy