Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

DoControl: Secure The SaaS Supply Chain

Truth in IT
07/04/2023
44
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


In this clip. DoControl covers the anatomy of SaaS supply chain attacks, covering five phases: infiltration, implantation, propagation, activation, and exploitation. Attackers gain access to the software supply chain through various techniques such as phishing, social engineering, or exploiting vulnerabilities. Once inside, they implant malicious code and spread it to other systems or applications to maximize the impact. The attackers then activate the code and exploit vulnerabilities to achieve their objectives, which could include data theft or disrupting system functionality.

SaaS supply chain risks focus on machine identity access and associated credentials, particularly in shadow applications that are unsanctioned by the IT department. These shadow apps may contain vulnerabilities or backdoors that can be exploited for unauthorized access to sensitive data. Compromising credentials and privileges involved in application-to-application interconnectivity is a proven technique used by attackers. Third-party apps often request more privileges than necessary, introducing additional accessibility vectors.

The webinar also highlighted notable breaches from the past year, including Samsung, GitHub, and Toyota. These breaches involved the compromise of credentials and OAuth tokens, allowing attackers to access sensitive data and exploit further infrastructure.

DoControl is a SaaS security platform focused on protecting business-critical SaaS applications. Their platform is built on three foundational tenets: discovery and visibility, monitoring and control, and automated remediation. DoControl aims to secure SaaS applications through automated security workflows, driving operational efficiency and enabling business productivity.
Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
Channels:
News:
Events:
Tags:
  • docontrol
  • repost
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: DoControl: Secure The SaaS Supply Chain

              Upcoming Webinar Calendar

              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Unveiling True Content Insights for Enhanced Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-unveiling-true-content-insights-for-enhanced-performance-through-page-level-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insights on IconAds, SlopAds, and AI Threats by 2026
                https://www.truthinit.com/index.php/channel/1649/insights-on-iconads-slopads-and-ai-threats-by-2026/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Upcoming Industry Events

                • Dec
                  16

                  HUMAN Dialogue: Unveiling True Content Insights for Enhanced Performance through Page-Level Intelligence

                  12/16/202501:00 PM ET
                  • Dec
                    18

                    Trend Micro Webinar: Smarter Decision Making via Network Intelligence

                    12/18/202511:00 AM ET
                    • Dec
                      18

                      Insights on IconAds, SlopAds, and AI Threats by 2026

                      12/18/202501:00 PM ET
                      More events

                      Upcoming 360 View Events

                      • Dec
                        18

                        360View: 2026 IT Predictions & Emerging Trends

                        12/18/202512:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                11

                                Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                12/11/202501:00 PM ET
                                • Dec
                                  11

                                  Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions

                                  12/11/202512:00 PM ET
                                  • Dec
                                    11

                                    Revamping Active Directory Management to Stay Secure in 2025

                                    12/11/202508:00 AM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version