Scirge blog

Scirge blog

Thoughts and news on Shadow IT and credential-related threats—such as breaches and account takeover. Tips and product updates on how to gain control over unmanaged third-party business web accounts.

Secure Browsing for the Enterprise

Secure Browsing for the Enterprise

Secure browsing is often defined by crucial requirements like protecting one’s pri...

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Post-breach investigation reports like those from IBM and Verizon agree that for t...

Credential Stuffing in the Media Industry aka.

Credential Stuffing in the Media Industry aka. "date-night offers"

As we discussed in an earlier blog post credential stuffing is one of the most pro...

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

In recent years, businesses have begun to adopt a cloud-first approach with increa...