Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

DoControl: Secure The SaaS Supply Chain

Truth in IT
07/04/2023
44
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


In this clip. DoControl covers the anatomy of SaaS supply chain attacks, covering five phases: infiltration, implantation, propagation, activation, and exploitation. Attackers gain access to the software supply chain through various techniques such as phishing, social engineering, or exploiting vulnerabilities. Once inside, they implant malicious code and spread it to other systems or applications to maximize the impact. The attackers then activate the code and exploit vulnerabilities to achieve their objectives, which could include data theft or disrupting system functionality.

SaaS supply chain risks focus on machine identity access and associated credentials, particularly in shadow applications that are unsanctioned by the IT department. These shadow apps may contain vulnerabilities or backdoors that can be exploited for unauthorized access to sensitive data. Compromising credentials and privileges involved in application-to-application interconnectivity is a proven technique used by attackers. Third-party apps often request more privileges than necessary, introducing additional accessibility vectors.

The webinar also highlighted notable breaches from the past year, including Samsung, GitHub, and Toyota. These breaches involved the compromise of credentials and OAuth tokens, allowing attackers to access sensitive data and exploit further infrastructure.

DoControl is a SaaS security platform focused on protecting business-critical SaaS applications. Their platform is built on three foundational tenets: discovery and visibility, monitoring and control, and automated remediation. DoControl aims to secure SaaS applications through automated security workflows, driving operational efficiency and enabling business productivity.
Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
  • » Cybersecurity » Identity & Access Management (IAM)
Channels:
News:
Events:
Tags:
  • docontrol
  • repost
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: DoControl: Secure The SaaS Supply Chain

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/

              Upcoming Events

              • Mar
                17

                L'importance cruciale de l'ITDR pour 2026 et au-delà

                03/17/202606:00 AM ET
                • Mar
                  18

                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                  03/18/202601:00 PM ET
                  • Mar
                    19

                    Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                    03/19/202611:00 AM ET
                    • Mar
                      19

                      Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                      03/19/202601:00 PM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version