Vorlon_Logo_Large_White
      • START HERE

      • icon-3
        The SaaS Ecosystem Security Gap
        Why your current tools miss how data really moves across SaaS.
      • icon (1)-3
        The SaaS Ecosystem Visibility Layer
        How security teams gain full visibility into users, bots, and AI.
      • PRODUCT

      • icon (2)-3
        Platform
        Total visibility across your SaaS ecosystem in one unified platform.
      • icon (4)-3
        Unified AI + SaaS Security
        Detect and respond to AI-driven SaaS risks in real time.
      • icon (3)-3
        Integrations
        Seamlessly integrate with your SIEM, SOAR, ITSMs, and other platforms.
      • COMPANY

      • About
        Leaders in SaaS ecosystem
        security
      • Contact
        Get in touch with us
      • Careers
        See job openings at Vorlon
      • Customer Support
        Access our customer support portal
  • Resources
  • Blog
  • slack_logo 1 Ask Anything
  • Book a Demo
      • START HERE

      • icon-3
        The SaaS Ecosystem Security Gap
        Why your current tools miss how data really moves across SaaS.
      • icon (1)-3
        The SaaS Ecosystem Visibility Layer
        How security teams gain full visibility into users, bots, and AI.
      • PRODUCT

      • icon (2)-3
        Platform
        Total visibility across your SaaS ecosystem in one unified platform.
      • icon (4)-3
        Unified AI + SaaS Security
        Detect and respond to AI-driven SaaS risks in real time.
      • icon (3)-3
        Integrations
        Seamlessly integrate with your SIEM, SOAR, ITSMs, and other platforms.
      • COMPANY

      • About
        Leaders in SaaS ecosystem
        security
      • Contact
        Get in touch with us
      • Careers
        See job openings at Vorlon
      • Customer Support
        Access our customer support portal
  • Resources
  • Blog
  • slack_logo 1 Ask Anything
  • Book a Demo

Vorlon Blog: Best Practices

Headshot of Adam Burt, Vorlon's head of research, with text Q&A with Adam Burt Part 1

Q&A with Adam Burt Part 1: Why SaaS Breach Investigations Are So Hard

Mar 14, 2025 2:00:00 PM
Read Now
The Postman Data Leak

The Postman Data Leak - Exposing the Hidden Risks of API Development

Jan 30, 2025 10:00:36 AM
Read Now
Snowflake breach response playbook

Snowflake Breach Response Playbook

Jan 27, 2025 9:51:27 AM
Read Now

The API Security Checklist: What to Review Before Integrating a Third-Party API

Oct 9, 2024 11:11:19 AM
Read Now

Securing More with Less: Navigating Cybersecurity in a Shrinking Budget Era

Sep 9, 2024 8:13:34 PM
Read Now
Cyber Punk Merchant Ship

PCI DSS 4.0 and Third-Party Apps in Merchant Business Ecosystems

May 15, 2024 7:00:00 AM
Read Now
Vorlon Bite Sized Breaches Blog

"I saw the [Dropbox] Sign and it opened up my eyes to continuously monitoring our third-party apps"

May 3, 2024 7:43:24 AM
Read Now
washing machine

Spin Cycle Security: Rotating Credentials

Mar 27, 2024 9:30:00 AM
Read Now

Giving Thanks: Why CISOs Owe a Feast of Gratitude to Their Security Teams

Nov 14, 2023 12:00:00 AM
Read Now
Waving Kitten

Bidding Farewell Securely: The Art of Employee Off-Boarding

Nov 2, 2023 9:23:00 AM
Read Now
1 2 Next
Vorlon_Logo_Large_White

Sign up for industry insights and Vorlon news

Start here

  • The SaaS Ecosystem Security Gap
  • The SaaS Ecosystem Visibility Layer

Product

  • Platform
  • Unified AI + SaaS Security
  • Integrations

Company

  • About
  • Careers
  • Press Room
  • Resources
  • Blog

Let's Connect

  • Talk to Sales
soc-type-2
aws logo cropped
latio innovators on black
FS-ISAC-Seal_Affiliate_onblack
© 2025 Vorlon Inc. All rights reserved.
  • Terms of Use
  • Privacy Policy
  • Sitemap