Scirge blog

Scirge blog

Thoughts and news on Shadow IT and credential-related threats—such as breaches and account takeover. Tips and product updates on how to gain control over unmanaged third-party business web accounts.

The Number One Security Challenge for Your Supply Chain Footprint in 2024

The Number One Security Challenge for Your Supply Chain Footprint in 2024

It’s no secret that cybersecurity threats are on the rise, and even tech giants li...

Scirge Cloud Is Here

Scirge Cloud Is Here

Understanding the needs of smaller organizations and cloud-first enterprises, we h...

Are Password Managers Broken?

Are Password Managers Broken?

Very recent breaches at LastPass and Norton LifeLock have stirred up the debate ab...

Scirge 3.5 – Instant Shadow IT Discovery & Audit

Scirge 3.5 – Instant Shadow IT Discovery & Audit

Big news in, we have just released a major feature: Instant Shadow IT Discovery! T...

Reporting on Shadow IT – Scirge Version 3.4

Reporting on Shadow IT – Scirge Version 3.4

One of the hardest things to do when it comes to security is to measure ROI. Test ...

Detecting Phishing Attacks with Shadow IT Discovery

Detecting Phishing Attacks with Shadow IT Discovery

Phishing attacks need no introduction, so we will skip the part where we discuss h...

Scirge 3.3 Version Released!

Scirge 3.3 Version Released!

Scirge version 3.3 has been released, with tons of improvements and new features. ...

How to Protect Microsoft Active Directory Passwords?

How to Protect Microsoft Active Directory Passwords?

Even though Microsoft has ranted about passwords being irrelevant, they do provide...

Oh, Behave! –Lessons About Attitudes and Behaviors Towards Cybersecurity

Oh, Behave! –Lessons About Attitudes and Behaviors Towards Cybersecurity

The recently released report by the National Cybersecurity Alliance on the percept...

And, in the Darkest Corner of Shadow IT: Privacy.

And, in the Darkest Corner of Shadow IT: Privacy.

When it comes to shadow IT and security, we have blogged about the oversight and c...

Cloud Security Trends Versus Reality

Cloud Security Trends Versus Reality

In the cutting-edge world of data, visibility into cloud and SaaS usage has been o...

Scirge Version 3 Released!

Scirge Version 3 Released!

As our next milestone, we are introducing version 3 of Scirge. We have added two m...

The Password Security Conundrum

The Password Security Conundrum

Password strength requirements have been around since the early 2000’s. Although t...

Anatomy of Account Takeover Attacks

Anatomy of Account Takeover Attacks

Account takeover (ATO) describes a scenario where user accounts and password integ...

Anatomy of Credential Stuffing Attacks

Anatomy of Credential Stuffing Attacks

Credential stuffing is the automated injection of usernames and passwords – usuall...