Vorlon Blog

All articles

Deloitte Features Vorlon's GenAI-Enabled Security Solution

What Is SSPM? A Guide to SaaS Security Posture Management

What Is Non-Human Identity? NHI Security Threats and Management

ShinyHunters Exploits Salesforce, Detection and Response Tips

Justin Lam’s SSPM Reality Check: Secure the Ecosystem, Not Just the App

Elevating Security Operations with the Vorlon and Google Security Operations Integration

Unifying SaaS and AI Security: Why Vorlon Is Looking at the Forest, Not Just the Trees

Vorlon MCP Server & DataMatrix Technology

Vorlon Is Headed to Black Hat USA 2025 — See You in Startup City!

Commvault Metallic Microsoft 365 Breach & What to Do Next

The Pearson Breach: How It Happened and Lessons Learned

Rand-User-Agent Attack: How It Happened & How to Protect Yourself

Verizon DBIR Reveals Third-Parties Involved in 30% of Breaches

Introducing DataMatrix™: Cracking Open the Black Box of SaaS Security

Vulnerabilities Gonna Vulnerability—And Third-Party Risk Won’t Manage Itself

Oracle Health Breach: What Security Teams Need to Know

The Blind Spots in SaaS Security: Q&A with Adam Burt Part 3

Compromised GitHub Action Targets Coinbase in SaaS Security Breach

Q&A with Adam Burt Part 2: The Hidden Dangers in Your SaaS Integrations

New OAuth Phishing Attack on GitHub:  What Security Teams Must Know

Q&A with Adam Burt Part 1: Why SaaS Breach Investigations Are So Hard

How Silk Typhoon Exploits IT Supply Chains and What You Can Do

Vorlon, Securing Financial SaaS Ecosystems, Sponsors FS-ISAC 2025

Discover Vorlon at RSAC 2025: A New Approach to SaaS Ecosystem Security

Grubhub Data Breach: A Costly Meal for Customers, Drivers, and Merchants

APIs in Healthcare: Transforming Data Sharing, Security, & Compliance

Meet Vorlon at ViVE 2025: Addressing Third-Party Risks in Healthcare IT

The Postman Data Leak - Exposing the Hidden Risks of API Development

Otelier Breach: When Hotel Management Checks Out

Snowflake Breach Response Playbook

The Stiiizy Data Breach: Lessons for Mitigating Third-Party Security Risks

BeyondTrust Breach: Implications for U.S. Treasury and beyond

Vorlon’s Perspective on the Gartner Report: Adapt Your Third-Party API Security to 3 Specific Use Cases

Better Together For All Parties: Salt Security and Vorlon

The API Security Checklist: What to Review Before Integrating a Third-Party API

Internal vs. Third-Party APIs: Who Would Win in a Fight!?

Mean Time To What!?

Capgemini's Data Disaster: When Hackers Turned Consulting into Chaos

Fortinet Hit by Cyber Attack: Third-Party Breach Affects Asia-Pacific Customers

Avis Car Rental Breach: Looks Like Cars Weren't the Only Thing Avis Was Giving Away

Better Together: Vorlon + Tines

Securing More with Less: Navigating Cybersecurity in a Shrinking Budget Era

Dick's Sporting Goods Breach - And How Vorlon Can Help

Put the Car in Gear and Shift Correctly: Highlights From SANS DFIR Summit

HealthEquity Breach - And How Vorlon Can Help

NYTimes Github Breach - And How Vorlon Can Help

CDK Global's Breach - And How Vorlon Can Help

Under the Hood: Examining Toyota’s Recent Data Breach

Vorlon v2.0 Summary and Highlights

Behind the Microphone: Insights from Our CISO Series Podcast Episode

From Functionality to Fortification: Securing Third-Party Integrations with Vorlon

Bitbucket Springs a (Secrets) Leak

PRESS RELEASE: SANS Institute Hails Vorlon as Impressive Solution

PCI DSS 4.0 and Third-Party Apps in Merchant Business Ecosystems

Mike Cioffi Joins Vorlon as VP of Customers

UK Ministry of Defence: “Third-Parties Are the Weakest Link, Goodbye”

"I saw the [Dropbox] Sign and it opened up my eyes to continuously monitoring our third-party apps"

Recommended Permanent(e) Changes for Healthcare Organizations: The Kaiser & Change Healthcare Breaches

More Than Just A Duo When A Third-Party Breach Hits

A Si(xth)Sense For Breaches

Press Release: Vorlon Raises Series A from Accel with $15.7 Million Total in Funding for Proactive Third-Party API Security

Float Like a Butterfly, Sting Like An OWASP

Cracking the Code: Navigating the Aftermath of AT&T's Mega Breach

More Than Shifting Left: Why Relying Solely on Third-Party Vendors to Get It Right Isn’t a Security Solution

Spin Cycle Security: Rotating Credentials

Unwind and Unplug: Relaxing Through the Art of Cybersecurity

The Dawn of Midnight Blizzard

Unpacking the American Express Third-Party Breach

Optum(ize) Your Security!!!

10 Questions to Ask About API Activity

Behind the Breach: Unraveling Bank of America's Third-Party Data Breach

Cloudy With a Chance of Breaches

Early Vorlon Adopters Reduce Time to Detect and Remediate Third-Party Risks to Minutes

You Say Goodbye, and I Say Trello

Coffee at Rest, Coffee in Motion

I Scream, You Scream, We All Scream For IOCs

HealthEC's Not-So-EZ Data Breach

Xfinity's Infinite Challenge: Citrix Bleed

Lessons Learned:  Navigating the 2023 Data Breach Landscape

Elf On the Shelf Reports All the Breaches

What Do Third-Party Apps and Holiday Gifts Have in Common?

Jingle Bells, Your API Smells....

Deals for a Dollar! Until a Data Breach Comes to Holler

O Canada: The Great Maple Leaf Cyber Mishap Unfolds

A Hard Pill to Swallow: Truepill's Data Breach

Giving Thanks: Why CISOs Owe a Feast of Gratitude to Their Security Teams

Sumo Logic's Guest List Gets a Surprise: An Uninvited Third-Party Crasher

The Push Notification Heard ‘Round the World: Okta’s Security Breach

Oops, Your Ancestors Have Been Hacked! A Closer Look at the 23andMe Data Breach

Bidding Farewell Securely: The Art of Employee Off-Boarding

October is Cybersecurity Awareness Month!

A Short and Sweet Guide to Data Breach Response

Betting Against the House: MGM's Unlucky Cyber Streak

Navigating the Digital Waves Safely: A Guide to Secure Web Surfing

The Alarming Surge in Healthcare Data Breaches: What You Need to Know

Unlocking the Power of Third Party Apps: A Guide to Best Practices and Beyond

Duolingo, Looks Like You Missed Your API Security Lesson Today!

Emerging Trends in Third-Party Apps

Rhysida Ransomware: A Sinister Crawl from the Undergrowth

Securing Your APIs in the Evolving Landscape of API Traffic

The Rise of Automation: Fueling Increased App-to-App Communication

I'm the Bad AI: The Misuse of Generative AI in Cyber Attacks

Simplifying the National Cybersecurity Strategy Implementation Plan (NCSIP)

Mastering API Token Management: Best Practices for Security and Efficiency

Finding the Balance: The Pros and Cons of Automation

Data Breaches Unveiled: Valuable Lessons for a Secure Future

The Risks and Benefits of Using Third-Party Apps in Your Business

I Like to MoveIt MoveIt