Reco Employs Graph and AI Technologies to Secure SaaS Apps

Reco today launched a platform that makes use of machine learning algorithms and graph technology to secure software-as-a-service applications.
The Reco Identities Interaction graph technology connects to SaaS applications via its application programming interface to establish and track the relationship between applications, data, accounts, permissions and end users.
Reco CEO Ofer Klein said that approach to SaaS security posture management will enable cybersecurity teams to take advantage of graph technology enabled by artificial intelligence to continuously secure the fastest-growing attack surface in the enterprise.
Cybersecurity teams can employ the Reco platform to also discover and protect any SaaS applications that employees have begun to use with or without authorization, he added.
Cybersecurity teams can then control access and prioritize actions to reduce risks.
The platform can be used to discover historical interactions with applications as the underlying graph technology discovers the SaaS application environment, noted Klein.
By employing graph technology, Reco is promising to significantly reduce the time and effort that would otherwise be required to secure SaaS applications.
The pace at which these applications are being adopted continues to outpace the ability of cybersecurity teams to protect attack surfaces, Graph technology enabled by AI provides cybersecurity teams with an approach that continuously discovers interactions with SaaS applications.
The issue that cybersecurity teams are contending with is that while they are held responsible for data security, they often lack the authority to prevent end users from subscribing to a SaaS application.
The Reco approach provides a method for applying security controls to any SaaS application that exposes an API. The graph technology employed by Reco was originally developed by the Israeli military to discover relationships between online activities of terrorists, noted Klein.
It's not clear how quickly cybersecurity teams are embracing AI to secure IT environments, but as the overall attack surface continues to expand, the ability of chronically short-staffed cybersecurity teams to protect platforms is limited.
AI technologies provide a mechanism that helps level a playing field that, today, is decidedly tipped in favor of cybercriminals.
The challenge, as always, is finding the budget for additional cybersecurity platforms at a time when many organizations are looking to either contain or outright slash IT spending.
The fact of the matter is that as the attack surface continues to expand, the amount of budget dollars allocated to protecting those platforms will need to increase.
In the meantime, it's safe to assume that cybercriminals are either already or soon will be leveraging AI to find and exploit weaknesses.
The only difference is the amount of budget they can allocate to experimenting with new technologies is considerably higher than the average IT organization.
One way or another as data protection regulations become more stringent, organizations will need to address SaaS application security in a way that goes well beyond the controls that any single provider of those applications may make available.


This Cyber News was published on securityboulevard.com. Publication date: Tue, 12 Dec 2023 14:43:20 +0000


Cyber News related to Reco Employs Graph and AI Technologies to Secure SaaS Apps

Reco Employs Graph and AI Technologies to Secure SaaS Apps - Reco today launched a platform that makes use of machine learning algorithms and graph technology to secure software-as-a-service applications. The Reco Identities Interaction graph technology connects to SaaS applications via its application ...
11 months ago Securityboulevard.com
The ONE Thing All Modern SaaS Risk Management Programs Do - Reducing SaaS risk is, without a doubt, a difficult challenge. Gaining visibility into all the SaaS apps used across an enterprise is hard enough, but it becomes an even greater challenge when only a portion of the apps go through the company's ...
7 months ago Securityboulevard.com
SaaS Asset and User Numbers are Exploding: Is SaaS Data Security Keeping Up? - DoControl's recently released The State of SaaS Data Security 2024 report revealed a striking picture of ballooning SaaS asset and user numbers alongside security gaps that open the door to exploitation. The report, based on data from DoControl's ...
7 months ago Cybersecurity-insiders.com
Introducing ThreatCloud Graph: A Multi-Dimensional Perspective on Cyber Security - In the face of complex and sophisticated cyber threats, enterprises struggle to stay ahead. Addressing this core challenge, Check Point introduces ThreatCloud Graph, focused on proactive prevention of emerging threats. This groundbreaking feature ...
11 months ago Blog.checkpoint.com
How the New NIST 2.0 Guidelines Help Detect SaaS Threats - The SaaS ecosystem has exploded in the six years since the National Institute of Standards and Technology's cybersecurity framework 1.1 was released. Back in 2016-2017, when version 1.1 was initially drafted, SaaS held a small but significant place ...
8 months ago Bleepingcomputer.com
How to Eliminate Shadow IT and Achieve a Secure SaaS Environment in 2023 - The prevalence of Shadow IT has grown exponentially over the years, with most organizations being unaware of the security risks of unauthorized cloud applications. Shadow IT is any application or cloud service being used by employees for business ...
1 year ago Thehackernews.com
The Qlik Cyber Attack: Why SSPM Is a Must Have for CISOs - On November 28 2023, Arctic Wolf Labs reported on a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform. With a breach like Qlik, the first question that ...
1 year ago Securityboulevard.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
11 months ago Esecurityplanet.com
Report Surfaces Extent of SaaS Application Insecurity - An analysis of how 493 organizations are employing software-as-a-service applications published today by Wing Security finds nearly all experienced a security incident involving at least one application. A full 81% reported security incidents ...
9 months ago Securityboulevard.com
SSPM: A Better Way to Secure SaaS Applications  - Security Boulevard - “GenAI can be incredibly powerful, but it must be used with caution,” Nakash warns, and adds that “if not properly managed, it can expose sensitive data or generate misleading insights.” As one report by Forrester notes, 71% of organizations ...
2 months ago Securityboulevard.com
AppOmni Previews Generative AI Tool to Better Secure SaaS Apps - AppOmni this week unveiled a technology preview of a digital assistant to its platform for protecting software-as-a-service applications that uses generative artificial intelligence to identify cybersecurity issues. The AskOmni assistant provides ...
11 months ago Securityboulevard.com
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store - On Android devices, one of the apps analyzed by researchers has more than 100,000 downloads, tracks, and shares location data with ByteDance and Amazon, etc. ChatGPT, the AI software, has already taken the Internet by storm, and that is why ...
1 year ago Hackread.com
Who is Responsible for Ensuring the Security of Data in SaaS Applications - As SaaS applications became more popular, it was unclear who was responsible for protecting the data. Nowadays, most security and IT teams understand the shared responsibility model, where the SaaS vendor is responsible for the application's ...
1 year ago Thehackernews.com
Savvy Launches Identity-First Security Offering to Combat Toxic Combinations Driving SaaS Risk - PRESS RELEASE. TEL AVIV, Israel, Jan. 16, 2024 - Savvy, a software-as-a-service security platform provider, today announced its Identity-First Security offering that uncovers risks created by a toxic combination of identity access management ...
10 months ago Darkreading.com
Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk - Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they are notoriously hard to trust. In an age when technology is constantly evolving, it is almost impossible to tell if a ...
11 months ago Cysecurity.news
What Is a SaaS Security Checklist? Tips & Free Template - SaaS security checklists are frameworks for protecting data and applications in cloud-based environments. These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee ...
7 months ago Esecurityplanet.com
Latest Information Security and Hacking Incidents - According to 25% of participants in an IBM study conducted in September 2022 among 3,000 companies and tech executives worldwide, security worries stand in the way of their ability to achieve their cloud-related goals. Nowadays, a lot of ...
10 months ago Cysecurity.news
Halting Hackers on the Holidays 2023 Part II: The Apps You Trust - Most free flashlight apps are creepware - also known as malware that spies on you and your online behavior and could pass along information to others. The problem doesn't begin and end with flashlight apps, though. Many seemingly innocuous apps that ...
11 months ago Cyberdefensemagazine.com
The Importance of Incident Response for SaaS - The importance of a thorough incident response strategy cannot be understated as organizations prepare to identify, investigate, and resolve threats as effectively as possible. Most security veterans are already well aware of this fact, and their ...
11 months ago Securityboulevard.com
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit - IBM's surprise departure from cybersecurity software this week didn't just rearrange the competitive landscape - it also reshuffled the procurement plans and vendor relationships for many CISOs rebuilding their SOCs. IBM has agreed to sell the QRadar ...
6 months ago Darkreading.com
Wing Security unveils automated protection against AI-SaaS risks - Wing Security unveils an automatic advanced approach to counter the evolving risks of Intellectual Property and data leakage into GenAI applications. Amidst the growing adoption of GenAI, and the many SaaS applications powered by GenAI, Wing brings ...
10 months ago Helpnetsecurity.com
Resecurity and ICS Technologies join forces to improve cybersecurity in Iraq - Resecurity and ICS Technologies IRAQ, a well-established ICT System Integration Company with HQ in Baghdad, Iraq, have joined forces to fortify cybersecurity, fraud prevention and risk intelligence measures nationwide. This strategic partnership is ...
11 months ago Helpnetsecurity.com
10 Ways a Digital Shield Protects Apps and APIs - While far from perfect, this approach provided multilayer security defenses to protect apps and APIs. As network architectures gradually became more complex, so did protecting apps and APIs. The on-premises enterprise environment gave way to a hybrid ...
6 months ago Darkreading.com
Productiv launches Sidekick, an AI-powered assistant for smarter SaaS management - Join leaders in Boston on March 27 for an exclusive night of networking, insights, and conversation. Productiv, a leading SaaS management platform, has announced the launch of Sidekick, an AI-powered chatbot designed to revolutionize how IT leaders ...
8 months ago Venturebeat.com
Former Global CISO of Wells Fargo, Sunil Seshadri, Joins Board of Directors at Obsidian Security - This week, Obsidian Security, announces the appointment of Sunil Seshadri to its Board of Directors. Sunil joins the board at a time when the Obsidian platform has become essential to Incident Response providers around the world as they respond to a ...
5 months ago Itsecurityguru.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)