{"id":7324,"date":"2014-08-05T00:00:00","date_gmt":"2014-08-05T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/08\/05\/saas-security-risks-its-the-users-stupid\/"},"modified":"2021-01-28T16:21:56","modified_gmt":"2021-01-28T16:21:56","slug":"saas-security-risks-its-the-users-stupid","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/","title":{"rendered":"SaaS Security Risks: It&#8217;s the Users, Stupid"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise&#8217;s data to attack.<\/p>\n<p>At the <a href=\"https:\/\/www.blackhat.com\/us-14\/\">Black Hat USA<\/a> conference in Las Vegas this week, security researchers from <a href=\"http:\/\/www.adallom.com\/\">Adallom <\/a>will present a workshop outlining some potential risks of SaaS applications that enterprises might not have considered.<\/p>\n<p>Tal Klein, VP of Strategy at Adallom, explained to <em>eSecurityPlanet <\/em>that an often-cited challenge of SaaS is the risk of <a href=\"https:\/\/www.itbusinessedge.com\/blogs\/data-security\/shadow-it-is-risky-business.html\">shadow IT<\/a>, services and content being run outside of the domain and knowledge of an enterprise&#8217;s IT department. Klein asserted that many IT users believethat simply encrypting their data protects them from cloud and SaaS risks. However, he noted, encryption typically only protects users if the SaaS provider itself gets compromised.<\/p>\n<p>It is more common for attackers to go after individual users or corporate accounts with phishing campaigns and other attack techniques in order to steal user access credentials. &#8220;In that case it doesn&#8217;t matter if the data is encrypted or not, because the attacker will still get access to the data,&#8221; he said.<\/p>\n<h2>SaaS Users at Risk<\/h2>\n<p>With SaaS, the attack surface shifts from the traditional application deployment landscape. Instead of infrastructure itself being the primary target, attacks are moving toward users who hold access rights to data. Individual users of SaaS apps also typically do not have appropriate security controls in place to fully minimize risk.<\/p>\n<p>One advanced technique that Adallom will walk through with Black Hat attendees is an attack that could potentially steal a user&#8217;s Google login credentials. Using a malicious page sitting on Google Sites, the attack tricks users with a phishing email. Since the user is already logged into Google, the attacker can then pivot and gain access to the user&#8217;s other Google Apps.<\/p>\n<p>&#8220;If I were to share a Google Doc with a user, Google asks the user to authenticate to Google Apps anyway,&#8221; Klein said. &#8220;So you can design an attack that looks like a legitimate document and have a real document at the end of the attack chain, but the login sequence is faked.&#8221;<\/p>\n<p>Users are not necessarily aware of the attack, because at the end of the click they get the document, Klein noted.<\/p>\n<p>Adallom will also discuss social masquerading, attacks in which fake social media profiles that are trusted by the victims are created. For example, attackers could create a fake LinkedIn profile for the CEO of a company and then send requests to employees of that company. The requests could require users to already be logged into the social media site, which allows the attacker to potentially steal the user&#8217;s access.<\/p>\n<p>Session highjacking, which doesn&#8217;t always need to be linked to phishing exploits, is another route to SaaS exploitation. &#8220;When a user hands over their login token, it provides more powerful access than simply handing over a username and password,&#8221; Klein said.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\">Two-factor authentication<\/a> is often recommended to prevent the risk of phishing attacks that go after user&#8217;s login information. With two-factor authentication, a second password (or factor) is required to gain access to a site or service.<\/p>\n<p>&#8220;With a token session highjacking, the attacker is tricking the user into authenticating into service they want access to and then forking the session and taking it over,&#8221; Klein said. &#8220;Once the attacker has the token, the attacker is acting as the user inside the session.&#8221;<\/p>\n<p>One of Adallom&#8217;s key messages is that a SaaS attack requires only the break-in stage. Once attackers have access, they have the data too.<\/p>\n<p>While some may believe that SaaS providers have the responsibility to provide all user security, Klein argued that it&#8217;s a shared responsibility model. While SaaS vendors should take steps to secure users, they cannot be accountable for human error, he said.<\/p>\n<p>&#8220;SaaS attacks are often invisible, and they are fairly easy to execute,&#8221; Klein said<\/p>\n<p>To help prevent SaaS-related attacks, Klein recommends educating users about the risks. &#8216;We also encourage organizations to get procurement teams involved in understanding the shared responsibility model,&#8221; he said.<\/p>\n<p>In addition, Adallom and competitors such as Netskope and Skyhigh Networks provide what is known as cloud access security brokers, which <a href=\"https:\/\/www.gartner.com\/it-glossary\/cloud-access-security-brokers-casbs\/\">Gartner describes<\/a> as &#8220;on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed.&#8221;<\/p>\n<p>Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter <a href=\"https:\/\/twitter.com\/search?mode=users&amp;q=techjournalist\">@TechJournalist<\/a>.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6d27d3c3e0-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d27d3c3e0\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d27d3c3e0\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d27d3c3e0\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d27d3c3e0\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d27d3c3e0\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d27d3c3e0\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise&#8217;s data to attack. At the Black Hat USA conference in Las Vegas this week, security researchers from Adallom will present a workshop [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,2514],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377,379],"class_list":["post-7324","post","type-post","status-publish","format-standard","hentry","category-networks","tag-cloud-security","tag-two-factor-authentication","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SaaS Security Risks: It&#039;s the Users, Stupid<\/title>\n<meta name=\"description\" content=\"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SaaS Security Risks: It&#039;s the Users, Stupid\" \/>\n<meta property=\"og:description\" content=\"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:21:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"SaaS Security Risks: It&#8217;s the Users, Stupid\",\"datePublished\":\"2014-08-05T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\"},\"wordCount\":770,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"cloud security\",\"two-factor authentication\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\",\"name\":\"SaaS Security Risks: It's the Users, Stupid\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2014-08-05T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:56+00:00\",\"description\":\"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SaaS Security Risks: It&#8217;s the Users, Stupid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SaaS Security Risks: It's the Users, Stupid","description":"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/","og_locale":"en_US","og_type":"article","og_title":"SaaS Security Risks: It's the Users, Stupid","og_description":"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/","og_site_name":"eSecurity Planet","article_published_time":"2014-08-05T00:00:00+00:00","article_modified_time":"2021-01-28T16:21:56+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"SaaS Security Risks: It&#8217;s the Users, Stupid","datePublished":"2014-08-05T00:00:00+00:00","dateModified":"2021-01-28T16:21:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/"},"wordCount":770,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["cloud security","two-factor authentication"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/","url":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/","name":"SaaS Security Risks: It's the Users, Stupid","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2014-08-05T00:00:00+00:00","dateModified":"2021-01-28T16:21:56+00:00","description":"Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SaaS Security Risks: It&#8217;s the Users, Stupid"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7324"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7324"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7324"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7324"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7324"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}