Scirge blog

Scirge blog

Thoughts and news on Shadow IT and credential-related threats—such as breaches and account takeover. Tips and product updates on how to gain control over unmanaged third-party business web accounts.

Scirge 2.5 Release and Beyond

Scirge 2.5 Release and Beyond

In order to understand your Cloud footprint, it’s crucial to collect information f...

Record Number Of Account Leaks In 2020

Record Number Of Account Leaks In 2020

Due to the global pandemic, most of our lives and livelihoods have shifted online....

Secure Browsing for the Enterprise

Secure Browsing for the Enterprise

Secure browsing is often defined by crucial requirements like protecting one’s pri...

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Post-breach investigation reports like those from IBM and Verizon agree that for t...

Credential Stuffing in the Media Industry aka.

Credential Stuffing in the Media Industry aka. "date-night offers"

As we discussed in an earlier blog post credential stuffing is one of the most pro...

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

In recent years, businesses have begun to adopt a cloud-first approach with increa...