All Resources

Osterman Research – Cybersecurity in Financial Services
  • Report

Osterman Research – Cybersecurity in Financial Services

Understanding emerging and enduring threats to financial services, and the efficacy of today’s cybersecurity solutions.

Prevent OAuth Abuse in the SaaS Environment
  • Video

Prevent OAuth Abuse in the SaaS Environment

Understand why monitoring third-party OAuth applications are critical to SaaS security

Identify and Mitigate SaaS Session Hijacking
  • Video

Identify and Mitigate SaaS Session Hijacking

Prevent attackers from capturing session tokens and establishing persistence within your SaaS environment

Zero Trust Security for SaaS Applications
  • Video

Zero Trust Security for SaaS Applications

Bring your business-critical applications within the framework of zero trust security

The Elements of Comprehensive SaaS Security
  • Video

The Elements of Comprehensive SaaS Security

Learn how the evolution of cybersecurity informs the components necessary to protect SaaS

Breaking Down SaaS Security Posture Management (SSPM)
  • Video

Breaking Down SaaS Security Posture Management (SSPM)

Understand the layers of SaaS posture and how SSPM solutions help you harden them

How Sigma Computing Secures SaaS
  • Video

How Sigma Computing Secures SaaS

Find out why Sigma Computing chose Obsidian to better understand and protect its SaaS environment.

Zero Trust in a SaaS World
  • Brief

Zero Trust in a SaaS World

Extending the principles of zero trust to your business-critical SaaS applications

Session Hijacking and Zero-Day Exploits
  • Video

Session Hijacking and Zero-Day Exploits

How the Coinbase security team identified and mitigated a sophisticated attack that leveraged a zero-day vulnerability in Firefox

Obsidian Security Solution Overview
  • Brief

Obsidian Security Solution Overview

The first truly comprehensive SaaS security and compliance solution built for the applications that drive your business.

Microsoft 365 Security Checklist
  • Brief

Microsoft 365 Security Checklist

Key considerations when building a better security approach for the productivity suite your organization relies on

Closing the Gaps in SaaS Security
  • Whitepaper

Closing the Gaps in SaaS Security

How to manage posture and mitigate threats across business-critical applications