Huge Gaps to Address in Application Security + Financial Services Woes + Spotlight on IAM

Huge Gaps to Address in Application Security + Financial Services Woes + Spotlight on IAM

Welcome to the CSA Roundup: The place where cybersecurity headaches meet their match. Inside this edition you’ll find nine expert perspectives on SaaS app visibility, security concerns in the finance sector, and the latest in IAM. So, what are you waiting for? Let’s get into it. 

(New here? Welcome aboard! Make sure to subscribe to stay in the loop!)


Fighting for Control Over Your SaaS Apps

5 Reasons Disconnected Apps Are An Enterprise Risk You Can No Longer Ignore

IAM, IGA, and PAM platforms are the backbone of modern identity security. But they can only secure what they connect to. Disconnected apps have become the fastest-growing blind spot in enterprise identity security. Understand why your business can no longer afford to ignore them.

How to Improve Risk Management with an Application Fabric

The fragmentation of increasingly distributed enterprise applications makes it difficult to secure access, govern usage, and manage compliance. In many cases, organizations don’t even know how many applications they have. Discover how an Application Fabric can help. 

When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach

In August, attackers exploited the Salesloft-Drift OAuth integration to compromise over 700 Salesforce instances, highlighting how SaaS supply chains, OAuth tokens, and identity gaps have become critical risks. Learn what happened and how you can protect your organization.


Understanding Modern Threats to Your Data

What Does Quantum Computing Mean for MFT?

Quantum computing, a field overshadowed by the AI frenzy, has the power to render current cryptography algorithms useless. Understand the basics of quantum computing and how it applies to Managed File Transfer (MFT).

Quantum Heist? Not So Fast — How Financial Institutions Can Fight Back

The SEC’s Post-Quantum Financial Infrastructure Framework (PQFIF) provides a roadmap for the quantum-safe transition of the global financial infrastructure. Take a look at this impressive roadmap and how financial institutions can implement it.

Hypervisor Security in Finance: Why Virtual Infrastructure is a Growing Ransomware Target

With over 65% of financial services organizations already reporting ransomware incidents this year, the need for robust hypervisor security has never been more critical. Explore why hypervisors have become prime targets for ransomware operators.


Getting a Handle on Identity & Access Management

Identity Security: Cloud’s Weakest Link in 2025

According to CSA’s State of Cloud and AI Security 2025 survey report, insecure identities and risky permissions are today’s top cloud security risks. Get more highlights from the report.

Passwordless Authentication - A Digital Trust Transformation in Combating Credential-Based Attacks

Passwordless authentication is becoming more relevant in the modern era of digital security by offering organizations a strong defense against credential-based cyber attacks. Explore how passwordless technologies work and how they are slowly reshaping authentication.

Role Engineering for Modern Access Control

In theory, Role-Based Access Control (RBAC) is elegant. In practice, it’s often anything but. Over time, identity programs fall prey to role creep, stale entitlements, convoluted hierarchies, and a sprawling mess of redundant or overlapping roles. Role engineering is how you take back control. Learn what role engineering is and how it beats traditional RBAC.


Check out more CSA blogs.

To view or add a comment, sign in

More articles by Cloud Security Alliance

Others also viewed

Explore content categories