article thumbnail

These 3 uncommon cybersecurity questions tell you if a SaaS application is secure

Audacix

While freemium offers are great for slashing the cost of evaluating a new marketing platform, have you considered the cybersecurity risks that these free trial offers pose to your IP, your data and your business? Why should you care about cybersecurity risks in someone else's SaaS? In our world of interconnected everything applications, these stats from Norton should have you concerned: The global average cost of recovering from a cybersecurity breach is US$3.86

article thumbnail

The best SaaS apps have these 7 web application security controls

Audacix

Combine the above overarching statistic with these 10 cybersecurity questions that enterprise clients consider when evaluating cloud service providers, you'll quickly realise that you've found the illuminated runway that leads to your cloud sales goals.

AWS 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to build a culture of security in fast-growing software companies who've raised funding

Audacix

When encrypting data at rest don't forget unstructured data stores such as AWS' S3 buckets. cybersecurity penetration testing SOC2The application security landscape is constantly changing, and with the increased frequency of software application breaches in recent years, it's crucial that companies are able to protect their application from cyberattacks.

Cloud 72
article thumbnail

How to build a culture of security in funded SaaS companies with software security best practices

Audacix

When encrypting data at rest don't forget unstructured data stores such as AWS' S3 buckets. cybersecurity penetration testing SOC2

Cloud 52
article thumbnail

Does your cloud application have this 7-pronged defensive line against hackers?

Audacix

Combine the above overarching statistic with these 10 cybersecurity questions that enterprise clients consider when evaluating cloud service providers, you'll quickly realise that you've found the illuminated runway that leads to your cloud sales goals. I’m not telling you cybersecurity is easy. But my web app is hosted on AWS/Azure/Google Cloud and they look after my security You’re not completely wrong, because to an extent these hosting platforms do provide a level of security.

Azure 49
article thumbnail

10 security questions enterprise customers have about SaaS/cloud software (but won't ask you)

Audacix

Some of the cybersecurity vulnerabilities may seem trivial to you, but we find them in almost every web application penetration test that we conduct for our clients. This statement is also curious because the secure encryption technologies that our cybersecurity experts recommend to our clients have negligible impact on your cloud software's performance. In cybersecurity terms account hijacking is best prevented through defence-in-depth measures.

Azure 45
article thumbnail

Why are your IT people so miserable? Log4j2itis

IT World

Are your IT people sobbing inconsolably even when Amazon Web Services (AWS) is running ? As Jen Easterly, director of the the US Cybersecurity and Infrastructure Security Agency (CISA), said: "The Log4j vulnerability is the most serious vulnerability I have seen in my decades-long career." Instead of holiday toasts, do you hear screams and moans from your server room? Do you walk over sleeping system administrators and developers when you get to the office?

article thumbnail

[WEBINAR REPLAY] How to build a culture of security in your software development teams

Audacix

Building a culture of security in you software development teams is not an easy task, but its crucial if you want to minimise the chances of unforeseen cybersecurity disasters and unfortunate media appearances. How to protect your cloud console with GCP/Azure/ AWS cloud console pentests.

article thumbnail

Taming SaaS Security Challenges with the Zero Trust Security Model

BetterCloud

With demonstrable success from Netflix and AWS, more companies are starting to offer their core businesses as microservices to expand their customer and revenue base. They must continue to invest in cybersecurity tools and technologies, increase their cybersecurity expertise, and retain cybersecurity talent who can stand up impenetrable cyber defense. This is the first part of our blog series on achieving effective SaaS management using a Zero Trust security model.

article thumbnail

The Fundamentals of Role-Based Access Control

BetterCloud

A crucial cybersecurity tenet for many years, least privilege means giving people only the permissions they need to get their job done. In AWS, these attributes are called tags. Tags can be attached to IAM principals (users or roles) and to AWS resources.”

Azure 52
article thumbnail

11 proven, DevOps best-practices for continuous improvement

Audacix

You need to believe that its is not only important, but also commercially beneficial to transform the cybersecurity of your applications from an afterthought to a competitive advantage. Naturally, your first choice is likely to be between choosing between AWS DevOps or Azure Devops.

article thumbnail

The Answers to Scaling, Hiring, and Everything Else: A SaaStr Europa AMA with SaaStr CEO Jason Lemkin (Pod 585 + Video)

SaaStr

I’m going to get the numbers wrong, I think Amazon has 10,000 open positions out in AWS. Same in cybersecurity, like the threats always change.

Scaling 210
article thumbnail

State of the Cloud 2019: Europa Edition with Alex Ferrara, Bessemer Venture Partners (Video + Transcript)

SaaStr

It was around that time about 12 years ago that Jeff Bezos launched AWS, and some of you may remember that, when he did this, Wall Street analysts were looking at him and saying, “Why would you take what’s already a very unprofitable business and drive it further into the red by investing in this AWS initiative?” Retail was mentioned twice, that’s it, and AWS was mentioned 78 times, so it’s probably not surprising that they’re doing this.

Cloud 100
article thumbnail

Starting Up In A Downturn with Cloudflare COO and Co-Founder Michelle Zatelyn (Video + Transcript)

SaaStr

So we build a service that does cybersecurity global performance or liability for any internet property. And I remember like AWS was growing really quickly. And at the time there was a big debate of, “Will big companies ever really use AWS?”

article thumbnail

SaaStr Podcasts for the Week with Tidelift and Cloudflare

SaaStr

So we built a service that does cybersecurity, global performance and reliability for any intranet property. And I remember AWS was growing really quickly. And at the time there was a big debate of, will big companies ever really use AWS?

article thumbnail

When Does Open Source Make Sense for a Business?

OpenView Labs

The Apache Software License v2 has long been a highly popular open-source license, but it has caused a lot of headaches in recent days as cloud services ( cough, cough, AWS ) have forked a number of projects and developed PaaS offerings around them.

SMB 52
article thumbnail

SaaStr Podcasts for the Week with Justin Bedecarre, Jen Nguyen, Jason Lemkin, and Aaron Levie

SaaStr

That happens to coincide with obviously some of the biggest challenges around cybersecurity, data compliance and privacy, GDPR, CCPA, who has access to your information?

article thumbnail

Top 30 SaaS Companies in the US

SmartKarrot

Amazon Web Services (AWS). Amazon, the global marketplace, also offers several other services, one of which is Amazon Web Services (AWS). AWS offers cloud services to businesses.

article thumbnail

170+ Women in Sales Share Their Career-Defining Aha Moment

Sales Hacker

Cybersecurity sales leader, founder of Relativity Sells, and MISC (mother in sales coach) helping new mothers return to the workplace confidently and free from anxiety. Amy Slater is Global Vice President and GTM leader for Cybersecurity company Palo Alto Networks.

Scale 137