All you need to know about protecting SaaS apps and data in the cloud
![What to Look for in a CSPM?](/static/4459eeb02a51e18a766d673b944ca64b/888e2/what-to-look-for-in-a-cspm.webp)
![Okta Security Best Practices](/static/92efc187d453834e74edca1259bb1e9c/888e2/okta-security-best-practices.webp)
![IAM Best Practices for AWS, Google Cloud and Azure](/static/2ac40e1f538ac411f31af89f7bb00616/888e2/securing-iam.webp)
![Common Cloud Misconfigurations and How to Avoid Them](/static/9af1415197c714721ab329e1204d8353/888e2/common-cloud-misconfigurations.webp)
MisconfigurationsWednesday, April 20, 2022
Common Cloud Misconfigurations and How to Avoid Them
![5 Steps to Improve Your Company’s Cloud Security Posture](/static/b4be0a73a12406a9b06930df91b77167/888e2/featured_image.webp)
![SOC 2 vs ISO 27001: What every SaaS needs to know](/static/48809b2bb298642ad9c8e20940f43f8f/888e2/microsoftteams-image.webp)
![PSD2 Requirements through the Technical Security Lens](/static/f7099646cc0f3e38c229f2faa1f6ee44/888e2/cyscale_psd2.webp)
ComplianceFriday, March 4, 2022
PSD2 Requirements through the Technical Security Lens
![Integrating NATS Into the Cyscale Platform](/static/cb4216e63701672e106156941ccdecaf/02dc4/nats-horizontal-color.webp)