Cloud security

  • How to Overcome Unprecedented Business Challenges Using Salesforce

    How to Overcome Unprecedented Business Challenges Using Salesforce

    With Salesforce, you can take times of change and turn them into opportunities. This whitepaper offers ways to establish a robust infrastructure, cut costs, and secure data using Salesforce.

    Read
  • Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.

    Read
  • The 18 areas organizations are monitoring for total cloud visibility

    Download Now
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • The Cost of Insider Threats in Financial Services and How to Reduce Them

    The Cost of Insider Threats in Financial Services and How to Reduce Them

    The cost of insider threats in financial services may be high, but there are ways to reduce them – find out how in this blog post.

    Read
  • Monthly Cloud Security Roundup: Marriott Data Breach, COVID-19 Cyber Security Challenges, and More

    Monthly Cloud Security Roundup: Marriott Data Breach, COVID-19 Cyber Security Challenges, and More

    Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the latest Marriott data breach, Ring’s call...

    Read
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data

    Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data

    If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.

    Read
  • Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More

    Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More

    Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • 6 Ways to Prevent Data Theft From Departing Employees

    6 Ways to Prevent Data Theft From Departing Employees

    Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.

    Read
  • Managing the Privileged User Threat: Best Practices for Salesforce

    Read the Guide
  • Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More

    Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More

    Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.

    Read
  • Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce

    Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce

    By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.

    Read
  • 5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.

    Read
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?

    Read
  • User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.

    Read
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • Monthly Cloud Security Roundup: A New Cybersecurity Act for Schools, a Military Ban on TikTok, Wawa’s Data Breach, and More

    Monthly Cloud Security Roundup: A New Cybersecurity Act for Schools, a Military Ban on TikTok, Wawa’s Data Breach, and More

    Discover the latest cloud security news with December’s roundup, including a new cybersecurity act for schools, a ban on TikTok, data breaches, and more.

    Read
  • 2019 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2019 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    What captivated CISOs, IT directors, Salesforce admins, and other cloud security readers this year? Find out with our 2019 year in review.

    Read
  • Monthly Cloud Security Roundup: The 2019 Dreamforce Conference, Microsoft’s Response to CCPA, a Potential US Federal Privacy Law, and More

    Monthly Cloud Security Roundup: The 2019 Dreamforce Conference, Microsoft’s Response to CCPA, a Potential US Federal Privacy Law, and More

    Discover the latest in cloud security news with November’s roundup, including the 2019 Dreamforce conference, Microsoft’s response to CCPA, and more.

    Read
  • Discover How FairWarning Maps to CCPA

    Discover How FairWarning Maps to CCPA

    Discover how FairWarning's user activity monitoring solution for cloud applications maps to the requirements for the California Consumer Privacy Act (CCPA).

    Read
  • Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More

    Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More

    Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.

    Read
  • Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?

    Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?

    Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.

    Read
  • Identify Security Risks and Interpret User Behaviors in Real Time

    Identify Security Risks and Interpret User Behaviors in Real Time

    If you want to build organizational trust through Salesforce data privacy and security – and meet compliance requirements in one platform – FairWarning provides the visibility you need on demand.

    Read
  • loading
    Loading More...