Wing Security unveils automated protection against AI-SaaS risks

Wing Security unveils an automatic advanced approach to counter the evolving risks of Intellectual Property and data leakage into GenAI applications.
Amidst the growing adoption of GenAI, and the many SaaS applications powered by GenAI, Wing brings awareness and control back to security teams who are facing a dynamic and complex new attack surface.
Wing's latest research covering over 320 companies, highlights the widespread adoption of AI-powered SaaS within businesses.
They found that 99.7% of organizations are utilizing SaaS applications powered by GenAI, one in five employees is actively using at least one AI application, and 70% of the most used applications can train their models based on customer data.
In many cases the AI capabilities are configurable, but most users are not aware of that without the proper solution in place.
By seamlessly automating the risk reduction process within business units, from discovery to analysis and through remediation, Wing ensures a collaborative and straightforward strategy for enhancing security.
The innovative approach alleviates the Chief Information Security Officer and their team from becoming bottlenecks in safeguarding the organization's sensitive data and Intellectual Property, preventing potential exposure to GenAI risks by including the applications' users in the remediation loop.
The company's new capability excels in identifying applications infused with AI capabilities, a crucial aspect that companies often overlook.
Wing's proficiency extends to determining whether SaaS apps used in daily business operations store their customers' data, employ AI to learn from the data, and facilitate human review to assist in their AI model training by manually reviewing this sensitive data.
To achieve this, Wing has elevated its unique insights and capabilities, empowering users to navigate the landscape with extensive visibility into over 300,000 applications, including those less commonly known.
Wing Security reinforces its dedication to safeguarding SaaS environments amid the evolving cybersecurity landscape shaped by AI. By integrating AI discovery capabilities into its free discovery tier, users can now benefit from essential security information with the ability to explore beyond this limit.
This enhancement reflects Wing's commitment to providing organizations with streamlined security operations, offering access to the industry's largest SaaS database for actionable security insights and empowering them with comprehensive tools to maximize their SaaS potential.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 17 Jan 2024 15:43:07 +0000


Cyber News related to Wing Security unveils automated protection against AI-SaaS risks

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
The ONE Thing All Modern SaaS Risk Management Programs Do - Reducing SaaS risk is, without a doubt, a difficult challenge. Gaining visibility into all the SaaS apps used across an enterprise is hard enough, but it becomes an even greater challenge when only a portion of the apps go through the company's ...
1 year ago Securityboulevard.com
Wing Security unveils automated protection against AI-SaaS risks - Wing Security unveils an automatic advanced approach to counter the evolving risks of Intellectual Property and data leakage into GenAI applications. Amidst the growing adoption of GenAI, and the many SaaS applications powered by GenAI, Wing brings ...
1 year ago Helpnetsecurity.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
2 weeks ago Cybersecuritynews.com
SaaS Asset and User Numbers are Exploding: Is SaaS Data Security Keeping Up? - DoControl's recently released The State of SaaS Data Security 2024 report revealed a striking picture of ballooning SaaS asset and user numbers alongside security gaps that open the door to exploitation. The report, based on data from DoControl's ...
1 year ago Cybersecurity-insiders.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
1 year ago Esecurityplanet.com
How the New NIST 2.0 Guidelines Help Detect SaaS Threats - The SaaS ecosystem has exploded in the six years since the National Institute of Standards and Technology's cybersecurity framework 1.1 was released. Back in 2016-2017, when version 1.1 was initially drafted, SaaS held a small but significant place ...
1 year ago Bleepingcomputer.com
Report Surfaces Extent of SaaS Application Insecurity - An analysis of how 493 organizations are employing software-as-a-service applications published today by Wing Security finds nearly all experienced a security incident involving at least one application. A full 81% reported security incidents ...
1 year ago Securityboulevard.com
Wing FTP Server Vulnerability Actively Exploited - 2000+ Servers Exposed Online - Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details were publicly disclosed. Organizations operating Wing FTP Server installations should prioritize upgrading to ...
20 hours ago Cybersecuritynews.com CVE-2025-47812
Securing SaaS Applications - Best Practices for CISO Oversight - By building these elements into a cohesive strategy, CISOs can establish sustainable SaaS security approaches that adapt to evolving threats and changing business requirements while maintaining adequate protection for the organization’s most ...
2 months ago Cybersecuritynews.com
The Qlik Cyber Attack: Why SSPM Is a Must Have for CISOs - On November 28 2023, Arctic Wolf Labs reported on a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform. With a breach like Qlik, the first question that ...
1 year ago Securityboulevard.com Cactus
How to Eliminate Shadow IT and Achieve a Secure SaaS Environment in 2023 - The prevalence of Shadow IT has grown exponentially over the years, with most organizations being unaware of the security risks of unauthorized cloud applications. Shadow IT is any application or cloud service being used by employees for business ...
2 years ago Thehackernews.com
What Is a SaaS Security Checklist? Tips & Free Template - SaaS security checklists are frameworks for protecting data and applications in cloud-based environments. These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee ...
1 year ago Esecurityplanet.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
3 months ago Cybersecuritynews.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
9 months ago Aws.amazon.com
Savvy Launches Identity-First Security Offering to Combat Toxic Combinations Driving SaaS Risk - PRESS RELEASE. TEL AVIV, Israel, Jan. 16, 2024 - Savvy, a software-as-a-service security platform provider, today announced its Identity-First Security offering that uncovers risks created by a toxic combination of identity access management ...
1 year ago Darkreading.com
Who is Responsible for Ensuring the Security of Data in SaaS Applications - As SaaS applications became more popular, it was unclear who was responsible for protecting the data. Nowadays, most security and IT teams understand the shared responsibility model, where the SaaS vendor is responsible for the application's ...
2 years ago Thehackernews.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
3 months ago Cybersecuritynews.com
Infosec products of the month: September 2024 - Help Net Security - Tenable AI Aware leverages agents, passive network monitoring, dynamic application security testing and distributed scan engines to detect approved and unapproved AI software, libraries and browser plugins, along with associated vulnerabilities, ...
9 months ago Helpnetsecurity.com
10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
4 months ago Cybersecuritynews.com
Hackers are exploiting critical RCE flaw in Wing FTP Server - Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw became public. The attacker sent malformed login requests with null-byte-injected ...
2 days ago Bleepingcomputer.com CVE-2025-47812
AppOmni Previews Generative AI Tool to Better Secure SaaS Apps - AppOmni this week unveiled a technology preview of a digital assistant to its platform for protecting software-as-a-service applications that uses generative artificial intelligence to identify cybersecurity issues. The AskOmni assistant provides ...
1 year ago Securityboulevard.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
2 months ago Cybersecuritynews.com Inception
Best Network Security Companies for CISOs - 2025 - This guide has spotlighted the top 10 network security companies—each excelling in specific domains such as zero trust, endpoint protection, AI-driven analytics, and cloud-native security. Zscaler offers a cloud-native security platform that ...
1 week ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)