[{"data":1,"prerenderedAt":8231},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"resource-index":155,"resources-v-2":230,"use-case-page":6639,"allCustomerStories":7576,"threat-research":8142},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"n0c69wxpcx","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"brpv9ps5x2",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-dloynz89rbq","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","vvf0k1j1pre",{"createdDate":156,"id":157,"name":158,"modelId":159,"published":13,"query":160,"data":166,"variations":220,"lastUpdated":221,"firstPublished":222,"testRatio":33,"screenshot":223,"createdBy":53,"lastUpdatedBy":72,"folders":224,"meta":225,"rev":229},1740571002492,"ce2a85936227498b90b73af27af78d66","ResoucePage","ff14a2a3d1e445598fed3079413025d5",[161],{"@type":162,"property":163,"operator":164,"value":165},"@builder.io/core:Query","urlPath","is","/resources/",{"seoDescription":167,"title":158,"seoTitle":168,"inputs":169,"themeId":6,"blocks":170,"url":165,"state":217},"A hub for all things browser threat detection and response. ","Content library",[],[171,212],{"@type":106,"@version":107,"id":172,"component":173,"responsiveStyles":210},"builder-dacae32f86814b96a34983ba28584ff8",{"name":174,"tag":174,"options":175,"isRSC":118},"ResourceSection",{"Hero Cards":176,"Highlight section title":182,"Highlight section content":183,"highlightContent":184,"highlightTitle":185,"highlightButtonText":186,"highlightButtonUrl":66,"heroCards":187,"host":188,"highlightImg":209},[177,181],{"title":178,"content":179,"file":180},"\u003Cp>2024: A year of identity attacks\u003C/p>","\u003Cp>2024 was an unprecedented year for identity attacks. Learn about the techniques attackers are using to take over identities and breach businesses.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0ff9ff26b4a047a6a4041194bbd9bddd",{},"5 ways new AI  agents can automate identity attacks","2025 has started off with a ton of AI hype. But so far, the impact of GenAI on cyber attacks has been seriously overstated. This could all be about to change with the introduction of a new type of AI agent — Computer-Using Agents (CUAs) — like OpenAI’s Operator. ","\u003Cp>Attackers are increasingly targeting users as they work in the browser, exploiting visibility and control gaps and flying under the radar of network and endpoint controls. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Learn about the browser-based attack techniques behind the biggest breaches today, and what security teams can do about it.\u003C/p>","\u003Cp>New Whitepaper: 2026 Browser Attack Techniques Report\u003C/p>","Download Now",[],{"@type":17,"id":189,"model":190,"value":191},"809e6061972e4a98a75cf92d6add3dba","push-employees",{"createdDate":192,"id":189,"name":193,"modelId":194,"published":13,"meta":195,"query":197,"data":198,"variations":203,"lastUpdated":204,"firstPublished":205,"testRatio":33,"createdBy":206,"lastUpdatedBy":72,"folders":207,"rev":208},1760040421522,"Mark Orlando","48dc72336f734204a27e16b4c76b6b76",{"breakpoints":196,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"name":199,"avatar":200,"surname":201,"jobtitle":202},"Mark","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9a9d1e52bba74c16b2c9dc9b378da80d","Orlando","Field CTO",{},1761303548398,1760040468859,"Vcs09PUqI9PcLtzXOEgfTn5t6n42",[],"y447kmtrahj","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9dd42c378a3c403c8bc38f15904beffd",{"large":211},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":213,"@type":106,"tagName":131,"properties":214,"responsiveStyles":215},"builder-pixel-cfdxsqxffwl",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":216},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":218},{"path":37,"query":219},{},{},1773252622360,1740571030793,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00c0002c53e452080e71910e11fdc7f",[],{"lastPreviewUrl":226,"breakpoints":227,"hasLinks":6,"kind":228,"hasAutosaves":6},"https://pushsecurity.com/resources/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resource-index&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resource-index=ce2a85936227498b90b73af27af78d66&builder.overrides.ce2a85936227498b90b73af27af78d66=ce2a85936227498b90b73af27af78d66&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","r2ig5kq2grr",[231,409,595,723,860,990,1129,1257,1373,1747,1851,1953,2090,2229,2352,2479,2603,2731,2850,2963,3063,3183,3287,3403,3517,3627,3742,3857,3972,4087,4202,4317,4431,4532,4648,4754,4870,4984,5099,5210,5329,5437,5542,5658,5769,5883,5992,6105,6205,6307,6409,6524],{"createdDate":232,"id":233,"name":234,"modelId":235,"published":13,"query":236,"data":239,"variations":399,"lastUpdated":400,"firstPublished":401,"testRatio":33,"screenshot":402,"createdBy":34,"lastUpdatedBy":72,"folders":403,"meta":404,"rev":408},1773238980036,"2a3cd0250d954720809138aedd307785","On-demand webinar: Managing Browser Extensions","e9fdeafccfb84c88b96f694861f88e3f",[237],{"@type":162,"property":163,"operator":164,"value":238},"/resources/browser-extensions-webinar",{"title":240,"private":6,"seoDescription":241,"coverImage":242,"description":241,"themeId":6,"seoTitle":240,"type":243,"blocks":244,"url":238,"state":396},"On-demand Webinar: Malicious Browser Extensions","Join us for a teardown of malicious extension functionality, where you’ll learn how to defend your organization from this new attack vector.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9f81c29dad7f47fd8db5cd528e566e76","Webinar",[245,278,361,373,391],{"@type":106,"@version":107,"id":246,"meta":247,"component":249,"responsiveStyles":272},"builder-475e3fcc21534ec8b863d406c5dafcd0",{"previousId":248},"builder-17c17e013d0b42a79da26a4da0ddd94f",{"name":250,"options":251,"isRSC":118},"Columns",{"columns":252,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[253],{"blocks":254},[255],{"@type":106,"@version":107,"id":256,"meta":257,"component":259,"responsiveStyles":263},"builder-3d2ed6790a6e4013ab5be38dedfcb5ea",{"previousId":258},"builder-e9a1fb1c2fd44bd7894bd280dabe34d1",{"name":260,"tag":260,"options":261,"isRSC":118},"PageTitle",{"title":262,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Webinar\u003C/span> — Malicious Browser Extensions: A Threat Modeling &amp; Mitigation Playbook\u003C/p>",{"large":264,"small":269},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},"0px","-20px","center","px",{"paddingLeft":265},50,"tablet",{"large":273,"small":277},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},"1320px","-2px","180px",{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":279,"meta":280,"component":282,"responsiveStyles":358},"builder-4aa90f6709ea4979aef743ed6df45c36",{"previousId":281},"builder-c29bf707cde0422383573aa3ce51ebd0",{"name":250,"options":283,"isRSC":118},{"columns":284,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[285,312],{"blocks":286,"width":311},[287,298],{"@type":106,"@version":107,"id":288,"meta":289,"component":291,"responsiveStyles":295},"builder-cb62a81042b9403dafa5e3c022b7be5b",{"previousId":290},"builder-85b13f5abb664b289149d28ac11c3b4f",{"name":292,"options":293,"isRSC":118},"youtube",{"videoId":294},"SWwDkIlYgxM",{"large":296},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},"40px",{"@type":106,"@version":107,"id":299,"component":300,"responsiveStyles":307},"builder-7670bb34f6094786a3a6b22acf22b5e0",{"name":301,"options":302,"isRSC":118},"Accordian",{"options":303},[304],{"optionTitle":305,"description":306},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Malicious Browser Extensions\u003C/span>\u003C/p>","\u003Cp>Attackers are doubling down on malicious browser extensions as their method of choice. Recent campaigns like ShadyPanda, ZoomStealer, GhostPoster, and the breaches impacting vendors like Cyberhaven and Trust Wallet, all highlight the threat posed by malicious extensions.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Thankfully, with the right tools and approach, organizations can take practical steps to bring the risk posed by malicious extension attacks to virtually zero.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>In this webinar, you’ll learn:\u003C/p>\u003Cul>\u003Cli>How attackers are abusing extensions in the wild\u003C/li>\u003Cli>Why malicious extensions can still be distributed via legitimate channels\u003C/li>\u003Cli>How to spot what makes an extension malicious or high-risk\u003C/li>\u003Cli>The operational pitfalls to watch out for when managing extensions\u003C/li>\u003Cli>Our step-by-step approach to securing browser extension use in your organization\u003C/li>\u003C/ul>\u003Cp>This event is designed for both hands-on practitioners and security leaders looking to translate technical capabilities into tangible response outcomes.&nbsp;\u003C/p>",{"large":308},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},"32px","20px",58.333,{"blocks":313,"width":357},[314,335,346],{"@type":106,"@version":107,"id":315,"component":316,"responsiveStyles":330},"builder-9785f72d26c649acaa6bc24d75d0050d",{"name":317,"options":318,"isRSC":118},"Spotlight",{"hosts":319},[320],{"host":321},{"@type":17,"id":189,"model":190,"value":322},{"createdDate":192,"id":189,"name":193,"modelId":194,"published":13,"meta":323,"query":325,"data":326,"variations":327,"lastUpdated":204,"firstPublished":205,"testRatio":33,"createdBy":206,"lastUpdatedBy":72,"folders":328,"rev":329},{"breakpoints":324,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"name":199,"avatar":200,"surname":201,"jobtitle":202},{},[],"sg976e1e6o",{"large":331,"small":334},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},"15px","50px",{"display":140},{"@type":106,"@version":107,"id":336,"meta":337,"component":339,"responsiveStyles":343},"builder-083dda179504441295fa52062f02313a",{"previousId":338},"builder-9c7f74e3f82347a3b23920b157e7afac",{"name":340,"options":341,"isRSC":118},"Text",{"text":342},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Mark and the team?\u003C/span>\u003C/p>",{"large":344},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},"auto",{"@type":106,"@version":107,"id":347,"meta":348,"component":350,"responsiveStyles":355},"builder-1be0d0d3e95b4e428803cad142653a06",{"previousId":349},"builder-e6a38f47e22d4f90a801cbc7570260eb",{"name":351,"tag":351,"options":352,"isRSC":118},"CTAButton",{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},"Contact Us","https://pushsecurity.com/contact/",{"large":356},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},41.667,{"large":359,"small":360},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":362,"meta":363,"component":365,"responsiveStyles":369},"builder-3a5ec83171104525866322f972115784",{"previousId":364},"builder-e9a8f016645e4463bbca46b18483355b",{"name":366,"tag":366,"options":367,"isRSC":118},"TrustedBy",{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":368},[],{"large":370,"small":372},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},"30px",{"display":140},{"@type":106,"@version":107,"id":374,"meta":375,"component":377,"responsiveStyles":386},"builder-d2f36ae6cde84bda931c9e2d8f59d8bd",{"previousId":376},"builder-208161c17f0b4a98b04f37fec599cf0b",{"name":378,"options":379,"isRSC":118},"Image",{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":385},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a?width=1680","cover",0.1219,195,1514,"(max-width: 638px) 88vw, (max-width: 998px) 94vw, 120vw",{"large":387,"small":390},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},"100%","10px",{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":392,"@type":106,"tagName":131,"properties":393,"responsiveStyles":394},"builder-pixel-xnd7lb0wx",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":395},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":397},{"path":37,"query":398},{},{},1773252002809,1773252002791,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6c35fe95e4214fd3b34eadb718ab9cea",[],{"winningTest":118,"kind":228,"hasLinks":6,"breakpoints":405,"originalContentId":406,"lastPreviewUrl":407,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"b7f20234632446328bdff7902e0d4d5d","https://pushsecurity.com/resources/browser-extensions-webinar?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=2a3cd0250d954720809138aedd307785&builder.overrides.2a3cd0250d954720809138aedd307785=2a3cd0250d954720809138aedd307785&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default","ylcfos67ckf",{"createdDate":410,"id":411,"name":412,"modelId":235,"published":13,"query":413,"data":415,"variations":586,"lastUpdated":587,"firstPublished":588,"testRatio":33,"screenshot":589,"createdBy":53,"lastUpdatedBy":148,"folders":590,"meta":591,"rev":408},1772464403154,"de2f65b6365e466ab45354420401050e","Browser Attacks 2026 Whitepaper",[414],{"@type":162,"property":163,"operator":164,"value":86},{"coverImage":209,"title":416,"description":417,"seoTitle":416,"themeId":6,"ogImage":418,"inputs":419,"seoDescription":417,"type":420,"blocks":421,"url":86,"state":583},"2026 Browser Attack Techniques","Get the report on the latest browser attack techniques being used by attackers in the wild.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb9a6238158184f93ac602428f44b897d",[],"Ebook",[422,437,445,452,469,480,491,503,578],{"@type":106,"@version":107,"id":423,"class":424,"meta":425,"component":427,"responsiveStyles":433},"builder-07ae2bf3575046a2be20a6a23d8e19c1","heroic-image",{"previousId":426},"builder-d5433ce8c0354a0e8a61a42c446af20c",{"name":428,"tag":428,"options":429,"isRSC":118},"TextImageBlockVertical",{"darkMode":41,"maxWidth":430,"maxTextWidth":430,"description":431,"title":432,"animatedTitle":37,"image":209,"reverse":6},1200,"\u003Cp>Browser-based attack techniques are behind the biggest breaches today.&nbsp;\u003C/p>\n\u003Cp>Learn how they’re bypassing cybersecurity controls and what security teams can do about it.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cdiv class=\"mt-14 mb-14\" data-v-875f7fd3=\"\">\n  \u003Ca href=\"#download\" class=\"px-9 py-3 border border-web-orange rounded-full cursor-pointer text-white bg-gradient-to-b from-web-orange to-web-orange-dark text-xl transition-all duration-500 hover:shadow-primary-button\" data-v-875f7fd3=\"\"\n    >\u003C!--[-->\n    Download report\n    \u003C!--]-->\u003C/a\n  >\n\u003C/div>\n","\u003Ch1 class=\"product-heading\">2026 \u003Cspan class=\"browser-attack-orange-block-clip\">Browser Attack\u003C/span> Techniques\u003C/h1>\n",{"large":434},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontSize":435,"backgroundColor":436,"pointerEvents":345},"1.5rem","transparent",{"@type":106,"@version":107,"id":438,"class":439,"meta":440,"responsiveStyles":442},"builder-86eae8ce83b246ff83026482582d943c","multi-color-glow-o",{"previousId":441},"builder-83b73e9caea6441f80ea8fae733456b1",{"large":443},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"height":444},"200px",{"@type":106,"@version":107,"id":446,"class":447,"meta":448,"responsiveStyles":450},"builder-bc3fe3c87fbb47a0856470c3aec79999","multi-color-glow-b",{"previousId":449},"builder-8c8af43ae72148fba11ff6bc58760c1a",{"large":451},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"height":444},{"@type":106,"@version":107,"id":453,"class":454,"meta":455,"component":457,"responsiveStyles":466},"builder-bff8bcdbba864fb5941f6b7c5a99464f","attack-techniques-border transparent-bg",{"previousId":456},"builder-601e475497dd43ad878051bfa241e293",{"name":458,"tag":458,"options":459,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":41,"maxWidth":460,"imageMaxWidth":461,"textPaddingTop":462,"title":463,"description":464,"image":465,"reverse":6},1600,600,0,"\u003Ch2>The browser is the new battleground\u003C/h2>","\u003Ch3 class=\"subheading\">Modern breaches begin in the browser.\u003Cbr />Often, they never leave it.\u003C/h3>\n\u003Cp>Many modern breaches happen entirely in the web browser. Attackers target your users as they go about their work, intercepting them as they access legitimate, trusted websites.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cp>Where we used to talk about novel software exploits and advanced endpoint malware, in 2026 we’re instead talking about cloud apps and identities as the “patient zero” of modern breaches.\u003C/p>\n","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F346aa12d011e48989f663160d9166ff0",{"large":467},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":468,"marginBottom":468,"backgroundColor":436},"4rem",{"@type":106,"@version":107,"id":470,"class":454,"meta":471,"component":473,"responsiveStyles":478},"builder-8d116acfc932418d940877dfec95fe1a",{"previousId":472},"builder-4361fac449ac40dc95d9ebd426621050",{"name":458,"tag":458,"options":474,"isRSC":118},{"darkMode":41,"maxWidth":460,"imageMaxWidth":461,"textPaddingTop":462,"title":475,"description":476,"image":477,"reverse":41},"\u003Ch2>Attackers are turning to browser-based TTPs\u003C/h2>","\u003Ch3 class=\"subheading\">Attackers are innovating fast.\u003C/h3>\n\u003Cp>Attackers in 2026 are using a wide (and growing) range of browser-based techniques to achieve a common goal: compromise cloud applications and services accessed over the internet, and ultimately profit from data theft, disruption, and extortion. This is now the primary attack path.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cp>We break down all of the major techniques, analysing in-the-wild use of AITM phishing, malicious OAuth apps, malicious browser extensions, credential stuffing (& ghost logins), ClickFix (and the family of *fix variants), and session hijacking.\u003C/p>\n","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff50a980ae65d4134bb9e6251bee024ae",{"large":479},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":468,"backgroundColor":436,"marginBottom":468},{"@type":106,"@version":107,"id":481,"class":454,"meta":482,"component":484,"responsiveStyles":489},"builder-aaf4eb2085bb4b13b15c20c11dafb106",{"previousId":483},"builder-e50292e4b67840af93a0e0b26fac003e",{"name":458,"tag":458,"options":485,"isRSC":118},{"darkMode":41,"maxWidth":460,"imageMaxWidth":461,"textPaddingTop":462,"title":486,"description":487,"image":488,"reverse":6},"\u003Ch2>Legacy tools can’t keep up\u003C/h2>","\u003Ch3 class=\"subheading\">The browser is a blind-spot for most security teams.\u003C/h3>\n\u003Cp>Browser-based attacks are so effective because they find ways around many traditional control points and security tools.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cp>It’s essential that blue teamers leave “list thinking” behind and re-evaluate whether their controls are providing the protection they thought they did.\u003C/p>\n","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Feeb669e8afd240fb8ab6213be6f3a6b8",{"large":490},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":468,"backgroundColor":436,"marginBottom":468},{"@type":106,"@version":107,"id":492,"properties":493,"component":495,"responsiveStyles":499},"builder-72bd269e38114a4489f47d0d20d7bd31",{"id":494},"download",{"name":496,"options":497,"isRSC":118},"Custom Code",{"code":498,"scriptsClientOnly":6},"\u003Cstyle>\n        .heroic-image {z-index: 3;}\n        .heroic-image img {max-width: 540px; margin-left:auto; margin-right:auto;\n        z-index:1;}\n        .heroic-image p {font-size: clamp(1.2 * 1rem, ((1.2 - ((1.5 - 1.2) / (90 - 20) * 20)) * 1rem + ((1.5 - 1.2) / (90 - 20)) * 100vw), 1.5 * 1rem);\n        z-index:1;}\n        .heroic-image h1 {\n          z-index:1;\n        }\n        .heroic-image .bg-dark-blue {background:transparent;}\n\n        .transparent-bg .bg-dark-blue {background:transparent;}\n      .browser-attack-orange-block-clip {  -webkit-text-fill-color: transparent;\n          -webkit-text-fill-color: transparent;\n          background-image: linear-gradient(14deg, #ff9d29 35%, #e73918 73%);\n          -webkit-background-clip: text;\n          background-clip: text;}\n\n    .subheading {\n        font-size: 1.45rem;\n        font-weight: 500;\n        line-height: 140%;\n        margin-bottom: 1rem;\n    }\n\n  .attack-techniques-border img {\n    background-image: linear-gradient(0deg, #ff9d29, #e73918 49%), linear-gradient(#0f1921, #12222c);\n      border-radius: 10px;\n      padding: 2px;\n      display: flex;\n  }\n\n\n      .multi-color-glow-o {\n        background: radial-gradient(50% 50% at 50% 50%, #FF8724 0, #FF872400 100%);\n        height: 100%;\n        left: 0px;\n        opacity: .2;\n        position: absolute;\n        top: 96px;\n        width: 100%;\n        z-index: 0;\n      }\n      .multi-color-glow-b {\n        background: linear-gradient(to bottom, #0EB1E400, #0EB1E4, #0EB1E400), radial-gradient(50% 50% at 50% 50%, #182835 0, #18283500 100%);\n        height: 100%;\n        left: 0px;\n        opacity: .1;\n        position: absolute;\n        top: 96px;\n        width: 100%;\n        z-index: 0;\n      }\n\n\n      @media (min-width: 1280px) {\n        .xl\\:py-\\[80px\\] {\n            padding-bottom: 80px;\n            padding-top: 0px;\n        }\n    }\n\n    @media (min-width: 991px) {\n    .product-heading {font-size: 64px;}\n    }\n\n    @media (max-width: 991px) {\n    .product-heading {font-size: 1.875rem;}\n    }\n\u003C/style>\n",{"large":500},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":501,"marginBottom":502},"0rem","5.5rem",{"@type":106,"@version":107,"id":504,"meta":505,"component":507,"responsiveStyles":575},"builder-134fc1e2a8a245fa84a890da0478bd96",{"previousId":506},"builder-0a2d74d4fe404afea96cb3ed04ffafca",{"name":250,"options":508,"isRSC":118},{"columns":509,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[510],{"blocks":511},[512,542,555,564],{"@type":106,"@version":107,"id":513,"component":514,"responsiveStyles":540},"builder-1ba354cfe9b54a59ac51e395eccdec97",{"name":250,"options":515,"isRSC":118},{"columns":516,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[517],{"blocks":518},[519,528],{"@type":106,"@version":107,"layerName":260,"id":520,"meta":521,"component":523,"responsiveStyles":526},"builder-eca53efef6e74cef83e30dfa720b69fe",{"previousId":522},"builder-7a2acfc9fb044ccbb417a127f00c2d82",{"name":260,"tag":260,"options":524,"isRSC":118},{"title":525},"\u003Cp>Download Now\u003C/p>",{"large":527},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginBottom":266,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":529,"meta":530,"component":532,"responsiveStyles":536},"builder-6d9c20a4580a46a28977538489f4a856",{"previousId":531},"builder-897593f6c3a44a78add018b6b911f52c",{"name":533,"tag":533,"options":534,"isRSC":118},"PageDescription",{"description":535},"\u003Cp>\u003Cstrong>Download your copy via the form below.\u003C/strong>\u003C/p>",{"large":537},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":538},"819px",20,{"large":541},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":543,"meta":544,"component":546,"responsiveStyles":553},"builder-a004459f6da94db2b00814d1b091291d",{"previousId":545},"builder-80699e3bb62348d5a3b4e939a5fc1f28",{"name":547,"tag":547,"options":548,"isRSC":118},"Form",{"chiliPiper":6,"prodFormId":549,"formTitle":37,"segmentId":550,"segmentFriendlyName":551,"subscribeForEmail":41,"downloadFile":552},"6712268b-50d1-4f3d-b0e7-76a145df1f72","browser_attacks_report_2026","Browser Attacks Report","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18836a2b5990433cabf1e9eaac50df34?alt=media&token=b2fe32c4-b4b5-4ec7-be21-d6b237d9f075&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":554},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":556,"meta":557,"component":559,"responsiveStyles":561},"builder-8a5641650e6341328f20f5f63ee0c2dd",{"previousId":558},"builder-4c3e32ced0884a95aa79cafc9a3887f4",{"name":366,"tag":366,"options":560,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":562,"small":563},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310,"paddingTop":297,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":565,"meta":566,"component":568,"responsiveStyles":573},"builder-ce26f13eed18419485c7552bab800088",{"previousId":567},"builder-935e7566edb54056913285710b923e13",{"name":378,"options":569,"isRSC":118},{"image":570,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":572},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a?width=1599",0.129,"(max-width: 638px) 88vw, (max-width: 998px) 92vw, 115vw",{"large":574},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":576},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":268,"marginLeft":577},"1px",{"id":579,"@type":106,"tagName":131,"properties":580,"responsiveStyles":581},"builder-pixel-bq57msw7n19",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":582},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":584},{"path":37,"query":585},{},{},1773932595364,1772577753222,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc6b86090c9384dd7b77b103d67d742aa",[],{"hasLinks":6,"lastPreviewUrl":592,"originalContentId":593,"breakpoints":594,"kind":228,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/resources/browser-attacks-report?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=de2f65b6365e466ab45354420401050e&builder.overrides.de2f65b6365e466ab45354420401050e=de2f65b6365e466ab45354420401050e&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default","11d8de1c34044e0c92bddd59ba4741b1",{"xsmall":57,"small":39,"medium":40},{"createdDate":596,"id":406,"name":597,"modelId":235,"published":13,"query":598,"data":601,"variations":714,"lastUpdated":715,"firstPublished":716,"testRatio":33,"screenshot":717,"createdBy":34,"lastUpdatedBy":148,"folders":718,"meta":719,"rev":408},1770574894908,"On-demand webinar: Choose Your Own Investigation",[599],{"@type":162,"property":163,"operator":164,"value":600},"/resources/investigating-browser-threats",{"title":602,"type":243,"coverImage":603,"description":604,"private":6,"themeId":6,"seoDescription":604,"seoTitle":605,"blocks":606,"url":600,"state":711},"On-demand Webinar: Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F821391da0ceb49e29ee7b7a31d690f6b","Join us for an interactive \"choose-your-own-adventure\" webinar on ClickFix, credential phishing, and other in-browser attacks we've observed in the wild.","On-demand Webinar: How Phishing Attacks Evolved in 2025",[607,627,689,698,706],{"@type":106,"@version":107,"id":248,"meta":608,"component":610,"responsiveStyles":624},{"previousId":609},"builder-f85d26f789ee4f30a705c1ee205371f1",{"name":250,"options":611,"isRSC":118},{"columns":612,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[613],{"blocks":614},[615],{"@type":106,"@version":107,"id":616,"meta":617,"component":618,"responsiveStyles":621},"builder-b7186b67555e455790736abac933397f",{"previousId":258},{"name":260,"tag":260,"options":619,"isRSC":118},{"title":620,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Webinar\u003C/span> — Choose Your Own Investigation\u003C/p>",{"large":622,"small":623},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":625,"small":626},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":281,"meta":628,"component":630,"responsiveStyles":686},{"previousId":629},"builder-b8d2223dba43435ca8d262b809b1657f",{"name":250,"options":631,"isRSC":118},{"columns":632,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[633,653],{"blocks":634,"width":311},[635,643],{"@type":106,"@version":107,"id":636,"meta":637,"component":638,"responsiveStyles":641},"builder-0f10a1d477194b2d8297ba16839a47a4",{"previousId":290},{"name":292,"options":639,"isRSC":118},{"videoId":640},"I-QaCmai3Ro",{"large":642},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":644,"component":645,"responsiveStyles":651},"builder-7b01d54b50a94a47981e5a0851e380db",{"name":301,"options":646,"isRSC":118},{"options":647},[648],{"optionTitle":649,"description":650},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> A Walkthrough of Modern Browser Threats\u003C/span>\u003C/p>\n","\u003Cp>Modern attacks have shifted focus to the browser, yet detection tools remain largely blind to the crucial activity happening there.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Stream our interactive \"choose-your-own-adventure\" webinar on ClickFix, credential phishing, and other in-browser attacks we've observed in the wild, where your fellow defenders' input determined the course of our investigations.\u003C/p>\u003Cul>\u003Cli>Learn how traditional security tools measure up against modern threats.\u003C/li>\u003Cli>Analyze the value of different telemetry sources vs. modern attacks.\u003C/li>\u003Cli>Learn how browser telemetry provides the data and context needed for effective response.\u003C/li>\u003C/ul>\u003Cp>This event is designed for both hands-on practitioners and security leaders looking to translate technical capabilities into tangible response outcomes.&nbsp;\u003C/p>",{"large":652},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":654,"width":357},[655,672,679],{"@type":106,"@version":107,"id":656,"component":657,"responsiveStyles":669},"builder-d249eb89377e46e7ad7e6c5807833ebb",{"name":317,"options":658,"isRSC":118},{"hosts":659},[660],{"host":661},{"@type":17,"id":189,"model":190,"value":662},{"createdDate":192,"id":189,"name":193,"modelId":194,"published":13,"meta":663,"query":665,"data":666,"variations":667,"lastUpdated":204,"firstPublished":205,"testRatio":33,"createdBy":206,"lastUpdatedBy":72,"folders":668,"rev":329},{"breakpoints":664,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"name":199,"avatar":200,"surname":201,"jobtitle":202},{},[],{"large":670,"small":671},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":673,"meta":674,"component":675,"responsiveStyles":677},"builder-391c6674affe43f4b03e27ea54b61ce5",{"previousId":338},{"name":340,"options":676,"isRSC":118},{"text":342},{"large":678},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":680,"meta":681,"component":682,"responsiveStyles":684},"builder-db2a4312f5614e2a90cc6f8a6fe345fa",{"previousId":349},{"name":351,"tag":351,"options":683,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":685},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":687,"small":688},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":364,"meta":690,"component":692,"responsiveStyles":695},{"previousId":691},"builder-94d89b946ad44b0c81347b68d8036d16",{"name":366,"tag":366,"options":693,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":694},[],{"large":696,"small":697},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":376,"meta":699,"component":701,"responsiveStyles":703},{"previousId":700},"builder-5eefb7bba2a3456198501f7284a3324f",{"name":378,"options":702,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":385},{"large":704,"small":705},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":707,"@type":106,"tagName":131,"properties":708,"responsiveStyles":709},"builder-pixel-rezy811swvf",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":710},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":712},{"path":37,"query":713},{},{},1770907671174,1770907671158,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4ed0c546bfda48b5b5b18e426d81e0de",[],{"winningTest":118,"breakpoints":720,"kind":228,"hasLinks":6,"lastPreviewUrl":721,"originalContentId":722,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/investigating-browser-threats?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=b7f20234632446328bdff7902e0d4d5d&builder.overrides.b7f20234632446328bdff7902e0d4d5d=b7f20234632446328bdff7902e0d4d5d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default","aed7d8df2b6745cfaa77efb3bd8e15b6",{"createdDate":724,"id":722,"name":725,"modelId":235,"published":13,"query":726,"data":729,"variations":851,"lastUpdated":852,"firstPublished":853,"testRatio":33,"screenshot":854,"createdBy":34,"lastUpdatedBy":72,"folders":855,"meta":856,"rev":408},1766045486170,"On-demand webinar: Phishing 2025",[727],{"@type":162,"property":163,"operator":164,"value":728},"/resources/phishing-2025-review",{"type":243,"private":6,"themeId":6,"description":730,"seoTitle":605,"coverImage":731,"title":605,"seoDescription":730,"blocks":732,"url":728,"state":848},"We’re excited to share our insights from 2025 with the industry, where we’ll be diving into Push data, analysing phish kit evolution, and sharing real-world attack case studies.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6b0b841660b4fa781675fae7211ff11",[733,753,826,835,843],{"@type":106,"@version":107,"id":609,"meta":734,"component":736,"responsiveStyles":750},{"previousId":735},"builder-ca45bff278ee4550a3fd6dc5218352ab",{"name":250,"options":737,"isRSC":118},{"columns":738,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[739],{"blocks":740},[741],{"@type":106,"@version":107,"id":742,"meta":743,"component":744,"responsiveStyles":747},"builder-66a8014e3c3247f3b25fe2f0925d2a10",{"previousId":258},{"name":260,"tag":260,"options":745,"isRSC":118},{"title":746,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Webinar\u003C/span> — How Phishing Attacks Evolved in 2025\u003C/p>",{"large":748,"small":749},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":751,"small":752},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":629,"meta":754,"component":756,"responsiveStyles":823},{"previousId":755},"builder-ddcf062c366d4facb3137889a37ae2fa",{"name":250,"options":757,"isRSC":118},{"columns":758,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[759,779],{"blocks":760,"width":311},[761,769],{"@type":106,"@version":107,"id":762,"meta":763,"component":764,"responsiveStyles":767},"builder-1964b8aa03224345acf672f8310f1ab2",{"previousId":290},{"name":292,"options":765,"isRSC":118},{"videoId":766},"Z3lXvXGfggs",{"large":768},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":770,"component":771,"responsiveStyles":777},"builder-f7331ca87be045ab8e6d1c28899864d8",{"name":301,"options":772,"isRSC":118},{"options":773},[774],{"optionTitle":775,"description":776},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> 2025 Phishing Review\u003C/span>\u003C/p>","\u003Cp>It’s been our busiest year yet when it comes to phishing investigations, with new phishing techniques, toolkits, and delivery methods intercepted by Push every day.&nbsp;\u003C/p>\u003Cp>﻿\u003C/p>\u003Cp>In real-world phishing attempts detected by Push in 2025, we’ve seen a huge rise in the volume and sophistication of phishing as attackers double-down on identity-based techniques — the leading cause of security breaches.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>We’re excited to share our insights from 2025 with the industry, where we’ll be diving into Push data, analysing phish kit evolution, and sharing real-world attack case studies.\u003C/p>",{"large":778},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":780,"width":357},[781,808,816],{"@type":106,"@version":107,"id":782,"component":783,"responsiveStyles":805},"builder-166e66a9ad0a4de0b505858308854399",{"name":317,"options":784,"isRSC":118},{"hosts":785},[786],{"host":787},{"@type":17,"id":788,"model":190,"value":789},"337362fb31b545459b94e2fabe5324a2",{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":792,"data":793,"variations":798,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":801,"meta":802,"rev":804},1728048684064,"Luke jennings",[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},"Luke","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F11642369725742b3a5c1e07d840eafda","Jennings","VP Research",{},1747058319359,1728048726793,[],{"breakpoints":803,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"yfzjd953su",{"large":806,"small":807},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":809,"meta":810,"component":811,"responsiveStyles":814},"builder-808565290b4f4b46823fcce7f9cb3646",{"previousId":338},{"name":340,"options":812,"isRSC":118},{"text":813},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Luke and the team?\u003C/span>\u003C/p>",{"large":815},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":817,"meta":818,"component":819,"responsiveStyles":821},"builder-556d593e9d554b609680fb43c8e44f1b",{"previousId":349},{"name":351,"tag":351,"options":820,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":822},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":824,"small":825},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":691,"meta":827,"component":829,"responsiveStyles":832},{"previousId":828},"builder-301f0c877112489bb6a205a503f28258",{"name":366,"tag":366,"options":830,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":831},[],{"large":833,"small":834},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":700,"meta":836,"component":838,"responsiveStyles":840},{"previousId":837},"builder-554e525239764476baf3f9181a6354a1",{"name":378,"options":839,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":385},{"large":841,"small":842},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":844,"@type":106,"tagName":131,"properties":845,"responsiveStyles":846},"builder-pixel-4huyx8me891",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":847},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":849},{"path":37,"query":850},{},{},1766045775364,1766045775335,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe18c6daadec04c158205977943828545",[],{"winningTest":118,"originalContentId":857,"hasLinks":6,"lastPreviewUrl":858,"breakpoints":859,"kind":228,"hasAutosaves":6},"ef220290db2e4808975c8b03cae30fae","https://pushsecurity.com/resources/phishing-2025-review?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=aed7d8df2b6745cfaa77efb3bd8e15b6&builder.overrides.aed7d8df2b6745cfaa77efb3bd8e15b6=aed7d8df2b6745cfaa77efb3bd8e15b6&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":861,"id":862,"name":863,"modelId":235,"published":13,"query":864,"data":867,"variations":982,"lastUpdated":983,"firstPublished":984,"testRatio":33,"screenshot":985,"createdBy":34,"lastUpdatedBy":206,"folders":986,"meta":987,"rev":408},1762972032664,"4a8ef6982b424f05b89667466a18e8ab","On-demand webinar: ESG/Omdia",[865],{"@type":162,"property":163,"operator":164,"value":866},"/resources/the-browser-blindspot",{"ogImage":868,"title":869,"private":6,"description":870,"seoDescription":870,"coverImage":871,"themeId":6,"seoTitle":869,"type":243,"blocks":872,"url":866,"state":979},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbfcbbfa057b642e7bf95e36a93daf6b5","On-demand Webinar: Endpoint Security Evolution","Learn how to how to bring endpoint-level visibility and detection into the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b8eef62b3894d8ea586818e9e44bdf7",[873,893,956,965,974],{"@type":106,"@version":107,"id":874,"meta":875,"component":876,"responsiveStyles":890},"builder-d72ef0d0224542cdab66c4da7840548a",{"previousId":735},{"name":250,"options":877,"isRSC":118},{"columns":878,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[879],{"blocks":880},[881],{"@type":106,"@version":107,"id":882,"meta":883,"component":884,"responsiveStyles":887},"builder-17ae50047e6b4b85b6b1573f4a125dc0",{"previousId":258},{"name":260,"tag":260,"options":885,"isRSC":118},{"title":886,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Webinar\u003C/span> — Endpoint Security Evolution\u003C/p>",{"large":888,"small":889},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":891,"small":892},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":894,"meta":895,"component":896,"responsiveStyles":953},"builder-df554b72166a4f34a133df299f59dad6",{"previousId":755},{"name":250,"options":897,"isRSC":118},{"columns":898,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[899,919],{"blocks":900,"width":311},[901,909],{"@type":106,"@version":107,"id":902,"meta":903,"component":904,"responsiveStyles":907},"builder-52edcc37681d47a09a56295d2c153325",{"previousId":290},{"name":292,"options":905,"isRSC":118},{"videoId":906},"5jHX48El1n4",{"large":908},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":910,"component":911,"responsiveStyles":917},"builder-cda4fd3472f4469aada3e8b8887f70b5",{"name":301,"options":912,"isRSC":118},{"options":913},[914],{"optionTitle":915,"description":916},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Endpoint Security Evolution\u003C/span>\u003C/p>","\u003Cp>The web browser has become the modern endpoint — it’s where employees work, collaborate, and access nearly every business-critical app. But as the browser takes center stage, it’s also becoming one of the most targeted layers in the enterprise attack surface.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Attackers are now targeting users via the browser to steal credentials, hijack sessions, and compromise SaaS accounts, often slipping past traditional endpoint and network defenses. These blind spots have left SOC and incident response teams without visibility into where many modern attacks actually start.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>In this webinar, you'll learn how security is evolving to meet this challenge — and how organizations can bring real-time threat detection and response into the browser itself.\u003C/p>\u003Cul>\u003Cli>Why the web browser has become the battleground for cyber attacks\u003C/li>\u003Cli>The most common browser-based attacks, and why traditional tools miss them\u003C/li>\u003Cli>How to bring endpoint-level visibility and detection into the browser\u003C/li>\u003C/ul>",{"large":918},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":920,"width":357},[921,938,946],{"@type":106,"@version":107,"id":922,"component":923,"responsiveStyles":935},"builder-973c7082c9e443a39c1a2f7ed3df398a",{"name":317,"options":924,"isRSC":118},{"hosts":925},[926],{"host":927},{"@type":17,"id":189,"model":190,"value":928},{"createdDate":192,"id":189,"name":193,"modelId":194,"published":13,"meta":929,"query":931,"data":932,"variations":933,"lastUpdated":204,"firstPublished":205,"testRatio":33,"createdBy":206,"lastUpdatedBy":72,"folders":934,"rev":329},{"breakpoints":930,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"name":199,"avatar":200,"surname":201,"jobtitle":202},{},[],{"large":936,"small":937},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":939,"meta":940,"component":941,"responsiveStyles":944},"builder-65c52dcaa27c49cfa9a5bb6f3c08e616",{"previousId":338},{"name":340,"options":942,"isRSC":118},{"text":943},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for the team?\u003C/span>\u003C/p>",{"large":945},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":947,"meta":948,"component":949,"responsiveStyles":951},"builder-31eac365cfcf4a4d98bcb8ee75a0ef61",{"previousId":349},{"name":351,"tag":351,"options":950,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":952},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":954,"small":955},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":957,"meta":958,"component":959,"responsiveStyles":962},"builder-f1de58c0c7ef42d098e450d4a24f731f",{"previousId":828},{"name":366,"tag":366,"options":960,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":961},[],{"large":963,"small":964},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":966,"meta":967,"component":968,"responsiveStyles":971},"builder-de98a967605f411abd489c9ff3f45891",{"previousId":837},{"name":378,"options":969,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},"(max-width: 638px) 90vw, (max-width: 998px) 94vw, 120vw",{"large":972,"small":973},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":975,"@type":106,"tagName":131,"properties":976,"responsiveStyles":977},"builder-pixel-xkexp9kw58",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":978},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":980},{"path":37,"query":981},{},{},1762982733854,1762980096593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2675a83d8fab46feb4f3f64d0e0a6fea",[],{"winningTest":118,"hasLinks":6,"breakpoints":988,"lastPreviewUrl":989,"originalContentId":857,"kind":228,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/the-browser-blindspot?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=4a8ef6982b424f05b89667466a18e8ab&builder.overrides.4a8ef6982b424f05b89667466a18e8ab=4a8ef6982b424f05b89667466a18e8ab&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":991,"id":992,"name":993,"modelId":235,"published":13,"meta":994,"query":997,"data":1000,"variations":1124,"lastUpdated":1125,"firstPublished":1126,"testRatio":33,"screenshot":1127,"createdBy":34,"lastUpdatedBy":72,"folders":1128,"rev":408},1761742680052,"1967267890f942c89d9883dfaf5703eb","Risky Business News 10/22/25 ",{"originalContentId":857,"winningTest":118,"breakpoints":995,"hasLinks":6,"kind":228,"lastPreviewUrl":996},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/rbn811?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=1967267890f942c89d9883dfaf5703eb&builder.overrides.1967267890f942c89d9883dfaf5703eb=1967267890f942c89d9883dfaf5703eb&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",[998],{"@type":162,"property":163,"operator":164,"value":999},"/resources/rbn811",{"type":1001,"themeId":6,"private":6,"coverImage":1002,"description":1003,"seoDescription":1003,"seoTitle":1004,"title":1004,"blocks":1005,"url":999,"state":1121},"Podcast","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4e77eb0c3d564770a3f4d8d6c9c9ad6a","Co-founder and Chief Product Officer Jacques Louw joins to talk through how Push traced a LinkedIn phishing campaign targeting CEOs, and the new logging capabilities that proved critical to understanding it.","Risky Business News: Sponsor Interview with Jacques Louw",[1006,1026,1099,1108,1116],{"@type":106,"@version":107,"id":1007,"meta":1008,"component":1009,"responsiveStyles":1023},"builder-1b4ef0e3a4aa4939ac798fe26196d828",{"previousId":735},{"name":250,"options":1010,"isRSC":118},{"columns":1011,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1012],{"blocks":1013},[1014],{"@type":106,"@version":107,"id":1015,"meta":1016,"component":1017,"responsiveStyles":1020},"builder-1e2449de4967446da3d820d544cab3c4",{"previousId":258},{"name":260,"tag":260,"options":1018,"isRSC":118},{"title":1019,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business News\u003C/span> — Episode 811 (Starts at 38:02)\u003C/p>",{"large":1021,"small":1022},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":1024,"small":1025},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":1027,"meta":1028,"component":1029,"responsiveStyles":1096},"builder-157c033a69f0479fbfe5254a0d14ad9b",{"previousId":755},{"name":250,"options":1030,"isRSC":118},{"columns":1031,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1032,1052],{"blocks":1033,"width":311},[1034,1042],{"@type":106,"@version":107,"id":1035,"meta":1036,"component":1037,"responsiveStyles":1040},"builder-2aee09a63e7340449bcd89a6b88b532d",{"previousId":290},{"name":292,"options":1038,"isRSC":118},{"videoId":1039},"yFanv9MEf4M?si=87Bx474Q43XvVWbm&t=2282",{"large":1041},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":1043,"component":1044,"responsiveStyles":1050},"builder-c798c8fbb726415f89c81c28b22d1109",{"name":301,"options":1045,"isRSC":118},{"options":1046},[1047],{"optionTitle":1048,"description":1049},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Jacques Louw Interview\u003C/span>\u003C/p>","\u003Cp>Co-founder and Chief Product Officer Jacques Louw joins to talk through how Push traced a LinkedIn phishing campaign targeting CEOs, and the new logging capabilities that proved critical to understanding it.\u003C/p>",{"large":1051},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":1053,"width":357},[1054,1081,1089],{"@type":106,"@version":107,"id":1055,"component":1056,"responsiveStyles":1078},"builder-7d72bc16598a45eea7f00307bd02b0cb",{"name":317,"options":1057,"isRSC":118},{"hosts":1058},[1059],{"host":1060},{"@type":17,"id":1061,"model":190,"value":1062},"c82df4949fcd42c693fc56f0a22d1514",{"createdDate":1063,"id":1061,"name":1064,"modelId":194,"published":13,"query":1065,"data":1066,"variations":1071,"lastUpdated":1072,"firstPublished":1073,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":1074,"meta":1075,"rev":1077},1744207167457,"Jacques Louw",[],{"name":1067,"jobtitle":1068,"avatar":1069,"surname":1070},"Jacques","Chief Research Officer (CRO)","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa88d9e9ed3bc450baebf54b9144fa220","Louw",{},1773328117153,1744207238489,[],{"breakpoints":1076,"kind":36,"winningTest":118,"lastPreviewUrl":37,"originalContentId":788,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"2lxohya2jys",{"large":1079,"small":1080},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":1082,"meta":1083,"component":1084,"responsiveStyles":1087},"builder-6619daaae24d4c368c92f425d23ccd01",{"previousId":338},{"name":340,"options":1085,"isRSC":118},{"text":1086},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Jacques and the team?\u003C/span>\u003C/p>",{"large":1088},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":1090,"meta":1091,"component":1092,"responsiveStyles":1094},"builder-c99ce66c93024ed88fa07232ced3164c",{"previousId":349},{"name":351,"tag":351,"options":1093,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":1095},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":1097,"small":1098},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":1100,"meta":1101,"component":1102,"responsiveStyles":1105},"builder-9398a734d153404fbe045ed9ecddacbb",{"previousId":828},{"name":366,"tag":366,"options":1103,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":1104},[],{"large":1106,"small":1107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":1109,"meta":1110,"component":1111,"responsiveStyles":1113},"builder-dd779a54af7b497ca3b0c71ec97a71e5",{"previousId":837},{"name":378,"options":1112,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":1114,"small":1115},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":1117,"@type":106,"tagName":131,"properties":1118,"responsiveStyles":1119},"builder-pixel-hpraxtn55qw",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1120},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1122},{"path":37,"query":1123},{},{},1761743104890,1761743104862,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F10dc1e40df3c46ee87adca19d0a9fbe8",[],{"createdDate":1130,"id":857,"name":1131,"modelId":235,"published":13,"meta":1132,"query":1136,"data":1139,"variations":1252,"lastUpdated":1253,"firstPublished":1254,"testRatio":33,"screenshot":1255,"createdBy":34,"lastUpdatedBy":72,"folders":1256,"rev":408},1761238448397,"On-demand webinar: ClickFix",{"lastPreviewUrl":1133,"breakpoints":1134,"originalContentId":1135,"winningTest":118,"kind":228,"hasLinks":6},"https://pushsecurity.com/resources/clickfix?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=ef220290db2e4808975c8b03cae30fae&builder.overrides.ef220290db2e4808975c8b03cae30fae=ef220290db2e4808975c8b03cae30fae&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"86a1ecd81cbf402eb9ceaab5cc168aeb",[1137],{"@type":162,"property":163,"operator":164,"value":1138},"/resources/clickfix",{"description":1140,"seoDescription":1140,"type":243,"seoTitle":1141,"private":6,"title":1141,"themeId":6,"ogImage":1142,"coverImage":1143,"blocks":1144,"url":1138,"state":1249},"Learn how ClickFix social engineering attacks are bypassing controls and driving security breaches.","On-demand Webinar: Analyzing ClickFix","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a3d3c57dbee4717a4be1fb8c670bec1","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffd4fcac7ae8e4b189942322c5021409a",[1145,1165,1227,1236,1244],{"@type":106,"@version":107,"id":735,"meta":1146,"component":1148,"responsiveStyles":1162},{"previousId":1147},"builder-824562b50aee4c53ae2b3cdfebcce38a",{"name":250,"options":1149,"isRSC":118},{"columns":1150,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1151],{"blocks":1152},[1153],{"@type":106,"@version":107,"id":1154,"meta":1155,"component":1156,"responsiveStyles":1159},"builder-bcad4f8d4561400fbc3acb0cc41c7432",{"previousId":258},{"name":260,"tag":260,"options":1157,"isRSC":118},{"title":1158,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Webinar\u003C/span> — Analyzing ClickFix\u003C/p>",{"large":1160,"small":1161},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":1163,"small":1164},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":755,"meta":1166,"component":1168,"responsiveStyles":1224},{"previousId":1167},"builder-24210e198aaa4a55bb12a47cc088672a",{"name":250,"options":1169,"isRSC":118},{"columns":1170,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1171,1191],{"blocks":1172,"width":311},[1173,1181],{"@type":106,"@version":107,"id":1174,"meta":1175,"component":1176,"responsiveStyles":1179},"builder-a2611ce1a35146b5903b5018d0dedc79",{"previousId":290},{"name":292,"options":1177,"isRSC":118},{"videoId":1178},"u28oeQuMRWU",{"large":1180},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":1182,"component":1183,"responsiveStyles":1189},"builder-c2384b1e6c914379bb664b6667d2f30b",{"name":301,"options":1184,"isRSC":118},{"options":1185},[1186],{"optionTitle":1187,"description":1188},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> ClickFix\u003C/span>\u003C/p>","\u003Cp>ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Join Luke Jennings, VP R&amp;D, to learn about:&nbsp;\u003C/p>\u003Cul>\u003Cli>How malicious copy &amp; paste attacks work\u003C/li>\u003Cli>Why they’re evading detection controls during both delivery &amp; execution\u003C/li>\u003Cli>Real-world attack examples showcasing the different attack variants\u003C/li>\u003Cli>The future of malicious copy &amp; paste techniques and payloads\u003C/li>\u003Cli>What security teams can do to improve detection and response\u003C/li>\u003C/ul>",{"large":1190},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":1192,"width":357},[1193,1210,1217],{"@type":106,"@version":107,"id":1194,"component":1195,"responsiveStyles":1207},"builder-f86939e30837487ab26105543d20e896",{"name":317,"options":1196,"isRSC":118},{"hosts":1197},[1198],{"host":1199},{"@type":17,"id":788,"model":190,"value":1200},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":1201,"data":1202,"variations":1203,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":1204,"meta":1205,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":1206,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":1208,"small":1209},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":1211,"meta":1212,"component":1213,"responsiveStyles":1215},"builder-173a344d9b394e95905e8da238705b34",{"previousId":338},{"name":340,"options":1214,"isRSC":118},{"text":813},{"large":1216},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":1218,"meta":1219,"component":1220,"responsiveStyles":1222},"builder-fa6d525946d64e69a1e85911bf0f6d7a",{"previousId":349},{"name":351,"tag":351,"options":1221,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":1223},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":1225,"small":1226},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":828,"meta":1228,"component":1230,"responsiveStyles":1233},{"previousId":1229},"builder-36236ead35ae48ff99e2fc12ac9e6e86",{"name":366,"tag":366,"options":1231,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":1232},[],{"large":1234,"small":1235},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":837,"meta":1237,"component":1239,"responsiveStyles":1241},{"previousId":1238},"builder-1414f9f5d5864c4683e60dc42cd800ad",{"name":378,"options":1240,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":1242,"small":1243},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":1245,"@type":106,"tagName":131,"properties":1246,"responsiveStyles":1247},"builder-pixel-yr02i4g5qqj",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1248},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1250},{"path":37,"query":1251},{},{},1761238902510,1761238902487,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0aeaf230585b45a3b4d6c36f934440d0",[],{"createdDate":1258,"id":1259,"name":1260,"modelId":235,"published":13,"query":1261,"data":1264,"variations":1365,"lastUpdated":1366,"firstPublished":1367,"testRatio":33,"screenshot":1368,"createdBy":53,"lastUpdatedBy":72,"folders":1369,"meta":1370,"rev":408},1760037691794,"95be80979b2f457587beb50f18fba586","ESG whitepaper ",[1262],{"@type":162,"property":163,"operator":164,"value":1263},"/resources/endpoint-security-evolution",{"type":420,"seoDescription":1265,"ogImage":1266,"title":1267,"description":1265,"themeId":6,"seoTitle":1268,"coverImage":1269,"blocks":1270,"url":1263,"state":1362},"Discover how attackers are shifting from endpoints to browsers, targeting identity, sessions, and SaaS activity. This Omdia Solution Showcase explains why traditional endpoint tools miss phishing, credential theft, and session hijacking — and how in-browser visibility, telemetry, and response can secure users where they work most.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F419b8f8fb999496db42b6c49fe2aeff3","Endpoint Security Evolution: Protect Your Enterprise from Browser-Based Threats","Endpoint Security Evolution: Threat Detection and Response in the Web Browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fed201d0576f545c18bd62a4e43c4d0af",[1271,1357],{"@type":106,"@version":107,"id":1272,"meta":1273,"component":1275,"responsiveStyles":1355},"builder-cc78845e99e845cea9e2d3266e6d3279",{"previousId":1274},"builder-e7a6ba8d980f49d3b41f9d1fa390a135",{"name":250,"options":1276,"isRSC":118},{"columns":1277,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1278],{"blocks":1279},[1280,1346],{"@type":106,"@version":107,"id":1281,"component":1282,"responsiveStyles":1344},"builder-4ea9fd211ecd4a1e853fc24f8c70201a",{"name":250,"options":1283,"isRSC":118},{"columns":1284,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1285,1332],{"blocks":1286},[1287,1295,1303],{"@type":106,"@version":107,"layerName":260,"id":1288,"meta":1289,"component":1290,"responsiveStyles":1293},"builder-cb345bc118274aff863e30d196dece33",{"previousId":522},{"name":260,"tag":260,"options":1291,"isRSC":118},{"title":1292},"\u003Cp>Solution Showcase:\u003C/p>\u003Cp>\u003Cspan style=\"color: rgb(245, 57, 20);\">The Browser Blindspot\u003C/span>\u003C/p>",{"large":1294},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginBottom":266},{"@type":106,"@version":107,"id":1296,"meta":1297,"component":1298,"responsiveStyles":1301},"builder-4cc07201ebfe49b59f46d35e5976eaa4",{"previousId":531},{"name":533,"tag":533,"options":1299,"isRSC":118},{"description":1300},"\u003Cp>As organizations harden their networks and devices, attackers have adapted — moving their focus to the browser, where identity, session, and SaaS activity converge.\u003C/p>\u003Cp>This Omdia (formerly Enterprise Strategy Group) Solution Showcase, Endpoint Security Evolution: Threat Detection and Response in the Web Browser, shows that securing endpoints has become harder as the threat landscape grows more complex.\u003C/p>\u003Cp>Many enterprises deploy secure browsers and DLP tools to reduce insider risk, but most solutions fail to detect or stop external threats like phishing or credential theft.\u003C/p>\u003Cp>To truly protect users, enterprises need visibility, telemetry, and response capabilities inside the browser itself.\u003C/p>",{"large":1302},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1304,"meta":1305,"component":1307,"responsiveStyles":1329},"builder-58ee6bd7981e45c1973cdba5360147d4",{"previousId":1306},"builder-9018aa1ae4ae49ffa69e91cf18a23fae",{"name":317,"options":1308,"isRSC":118},{"hosts":1309},[1310],{"host":1311},{"@type":17,"id":1312,"model":190,"value":1313},"5b6aecf385714cba87b17b6f76a55da1",{"createdDate":1314,"id":1312,"name":1315,"modelId":194,"published":13,"meta":1316,"query":1318,"data":1319,"variations":1324,"lastUpdated":1325,"firstPublished":1326,"testRatio":33,"createdBy":206,"lastUpdatedBy":206,"folders":1327,"rev":1328},1760040324342,"Todd Theimann",{"lastPreviewUrl":37,"breakpoints":1317,"kind":36},{"xsmall":57,"small":39,"medium":40},[],{"avatar":1320,"name":1321,"surname":1322,"jobtitle":1323},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F996cc83806834a7bbd7a620e9d24cd0d","Todd ","Thiemann","Principal Analyst, Omdia (formerly ESG) ",{},1760042276913,1760040380075,[],"j65ocqlwkrr",{"large":1330,"small":1331},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingTop":265,"marginTop":265},{"display":140},{"blocks":1333},[1334],{"@type":106,"@version":107,"id":1335,"component":1336,"responsiveStyles":1342},"builder-000b439a56df4be49c34e024605568f6",{"name":547,"tag":547,"options":1337,"isRSC":118},{"chiliPiper":6,"prodFormId":1338,"formTitle":1339,"segmentId":1340,"segmentFriendlyName":87,"subscribeForEmail":41,"downloadFile":1341},"0036dcd8-b60d-4bdd-9d1a-a09fc357e5cd","Get your copy here","download_now","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd9ec727094f94931abe567695df7a9ab?alt=media&token=8394a479-aca3-4f98-9953-87b1b43bb557&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":1343},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"large":1345},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":1347,"meta":1348,"component":1349,"responsiveStyles":1353},"builder-0eb7276b909b4b59a56eafd87bf87d4d",{"previousId":567},{"name":378,"options":1350,"isRSC":118},{"image":1351,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":1352},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a?width=1320","(max-width: 638px) 90vw, (max-width: 998px) 94vw, 95vw",{"large":1354},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":1356},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":268},{"id":1358,"@type":106,"tagName":131,"properties":1359,"responsiveStyles":1360},"builder-pixel-tch3claf4t",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1361},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1363},{"path":37,"query":1364},{},{},1765481316991,1760431684701,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4df32169bea94e1385bfe4fe244c25e4",[],{"hasLinks":6,"winningTest":118,"kind":228,"originalContentId":593,"breakpoints":1371,"lastPreviewUrl":1372,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/endpoint-security-evolution?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=95be80979b2f457587beb50f18fba586&builder.overrides.95be80979b2f457587beb50f18fba586=95be80979b2f457587beb50f18fba586&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1374,"id":1375,"name":1376,"modelId":235,"published":13,"stageModifiedSincePublish":6,"query":1377,"data":1380,"variations":1738,"lastUpdated":1739,"firstPublished":1740,"testRatio":33,"screenshot":1741,"createdBy":148,"lastUpdatedBy":1742,"folders":1743,"meta":1744,"rev":408},1775143363381,"f21fd76b02fc4a5fb0e5e7fa38ce81b4","Every single AI interaction in your environment starts in the browser.",[1378],{"@type":162,"property":163,"operator":164,"value":1379},"/resources/ai-starts-browser",{"seoDescription":1381,"title":1382,"coverImage":1383,"seoTitle":1376,"themeId":6,"customFonts":1384,"description":1432,"type":420,"blocks":1433,"url":1379,"state":1735},"Good thing Push secures AI interactions and gives security teams complete visibility into how users and AI agents are interacting with AI tools","AI interactions in your environment start in the browser.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb75db66f1edc4de1b6c483d32712e997",[1385],{"subsets":1386,"category":1389,"lastModified":1390,"family":1391,"version":1392,"files":1393,"kind":1412,"variants":1413,"menu":1431},[1387,1388],"latin","latin-ext","sans-serif","2023-07-13","DM Sans","v14",{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"600italic":1402,"700italic":1403,"regular":1404,"200italic":1405,"500italic":1406,"italic":1407,"100italic":1408,"900italic":1409,"800italic":1410,"300italic":1411},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","webfonts#webfont",[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf","Good thing Push gives you AI security visibility.",[1434,1441,1452,1706,1713,1730],{"@type":106,"@version":107,"id":1435,"component":1436,"responsiveStyles":1439},"builder-b31341a816764e3c9bc2c467760fb85d",{"name":496,"options":1437,"isRSC":118},{"code":1438,"scriptsClientOnly":6},"\u003Cstyle>\n        .builder-a990b3e7304a40009b50e67ae722b593.builder-block .text-white.bg-dark-blue {\n            background: transparent;\n        }\n\n      .builder-a990b3e7304a40009b50e67ae722b593.builder-block h2 strong {\n          font-size: 20px;\n          font-weight: 600;\n      }\n\n      .builder-text h3 strong {\n        font-size: 1.9rem;\n        padding-top: .5rem;\n      }\n\n  .box-2 {\n    margin-bottom: 20rem;\n  }\n\n  .outer-container .inner-container[data-v-b53e6b60].p-8 {padding-left: 0px;\n  padding-right:0px;}\n\n    @media (max-width: 768px) {\n     .builder-column .builder-text h3:first-of-type {\n          margin-top: 2rem;\n          padding-top: 1rem;\n        }\n    .box-2 {\n          margin-bottom: 25rem;\n        }\n    }\n  @media (max-width: 400px) {\n    .box-2 {\n          margin-bottom: 30rem;\n        }\n  }\n\u003C/style>\n",{"large":1440},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1442,"component":1443,"responsiveStyles":1448},"builder-a990b3e7304a40009b50e67ae722b593",{"name":458,"tag":458,"options":1444,"isRSC":118},{"darkMode":41,"maxWidth":460,"imageMaxWidth":461,"textPaddingTop":462,"title":1445,"description":1446,"image":1447,"reverse":41},"\u003Ch1 class=\"md:text-5xl text-3xl\">\u003Cstrong>Every single AI interaction in your environment starts in the browser.\u003C/strong>\u003C/h1>\n","\u003Ch2>\u003Cstrong>Good thing Push gives you AI security visibility.\u003C/strong>\u003C/h2>\n\u003Cp>Push gives security teams complete visibility into how users and AI agents are interacting with AI tools, and the controls you need to act on it.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cdiv class=\"mt-14\" data-v-875f7fd3=\"\">\n  \u003Ca href=\"/demo/\" class=\"px-9 py-3 border border-web-orange rounded-full cursor-pointer text-white bg-gradient-to-b from-web-orange to-web-orange-dark text-xl transition-all duration-500 hover:shadow-primary-button\" data-v-875f7fd3=\"\"\n    >\u003C!--[-->\n    Secure your AI\n    \u003C!--]-->\u003C/a\n  >\n\u003C/div>\n","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1449},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436,"maxWidth":1450,"marginLeft":345,"marginRight":345,"paddingRight":1451},"1600px","1rem",{"@type":106,"@version":107,"tagName":1453,"id":1454,"meta":1455,"children":1457,"responsiveStyles":1702},"div","builder-01c0879fddd844878b11a0bc69e2e31b",{"previousId":1456},"builder-76c6b8d1499346c7bc1fd56ae4e93638",[1458,1467,1476,1483,1495,1504,1567,1611,1657,1672,1687],{"@type":106,"@version":107,"id":1459,"meta":1460,"component":1462,"responsiveStyles":1464},"builder-28d15b5e11d946f9bbea9245e4211f5b",{"previousId":1461},"builder-96634044407e491299e291ed64669e39",{"name":366,"options":1463,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1465},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},"#000",{"@type":106,"@version":107,"id":1468,"meta":1469,"component":1471,"responsiveStyles":1474},"builder-38473c1aeefe4f888d4472b017549ec9",{"previousId":1470},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":1472,"options":1473,"isRSC":118},"Diagonal",{"darkMode":41},{"large":1475},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1477,"component":1478,"responsiveStyles":1481},"builder-e75a21c67ad4429ebe29600541c99c88",{"name":496,"options":1479,"isRSC":118},{"code":1480,"scriptsClientOnly":6},"\u003Cdiv class=\"section-container\" id=\"section\">\n  \u003Cdiv class=\"bg-white-layer\">\u003C/div>\n  \u003Cdiv class=\"red-layer\">\u003C/div>\n  \u003Cdiv class=\"dark-layer\">\n    \u003C!-- your content here -->\n  \u003C/div>\n\u003C/div>\n\n\u003Cscript>\n  const observer = new IntersectionObserver(\n    (entries) => {\n      entries.forEach(entry => {\n        if (entry.isIntersecting) {\n          entry.target.classList.add('animated');\n          observer.unobserve(entry.target);\n        }\n      });\n    },\n    { threshold: 0.3 }\n  );\n\n  document.querySelectorAll('.section-container').forEach(el => {\n    observer.observe(el);\n  });\n\u003C/script>\n\u003Cstyle>\n  .section-container {\n    position: relative;\n    width: 100%;\n    height: 100px; /* adjust to taste */\n    overflow: hidden;\n  }\n\n  .bg-white-layer {\n    position: absolute; inset: 0;\n    background: #ffffff;\n    z-index: 0;\n  }\n\n  .red-layer {\n    position: absolute; inset: 0;\n    background: #e84c1e;\n    z-index: 1;\n    clip-path: polygon(0 0, 100% 0, 100% 100%, 0 100%);\n    transition: clip-path 1.4s cubic-bezier(0.76, 0, 0.24, 1);\n  }\n\n  .dark-layer {\n    position: absolute; inset: 0;\n    background: #000;\n    z-index: 2;\n    clip-path: polygon(0 0, 100% 0, 100% 100%, 0 100%);\n    transition: clip-path 1.4s cubic-bezier(0.76, 0, 0.24, 1) 0.05s;\n  }\n\n  .white-layer {\n    position: absolute; inset: 0;\n    background: #FFF;\n    z-index: 2;\n    clip-path: polygon(0 0, 100% 0, 100% 100%, 0 100%);\n    transition: clip-path 1.4s cubic-bezier(0.76, 0, 0.24, 1) 0.05s;\n  }\n\n  /* end state — add .animated via JS on scroll */\n  .section-container.animated .red-layer {\n    clip-path: polygon(0 0, 100% 0, 100% 37%, 0 96%);\n  }\n\n  .section-container.animated .dark-layer {\n    clip-path: polygon(0 -1px, 100% -1px, 100% 20%, 0 100%);\n  }\n\n  .section-container.animated .white-layer {\n    clip-path: polygon(0 -1px, 100% -1px, 100% 20%, 0 100%);\n  }\n\n  .builder-e75a21c67ad4429ebe29600541c99c88.builder-block {\n    margin-top: -2px;\n  }\n\u003C/style>\n",{"large":1482},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":428,"id":1484,"meta":1485,"component":1487,"responsiveStyles":1493},"builder-86db27cf5aa0436ca0c3476fe06a6fb6",{"previousId":1486},"builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":428,"tag":428,"options":1488,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":1490,"description":1491,"animatedTitle":37,"image":1492,"reverse":6,"descriptionPaddingHorizontal":118},800,"\u003Ch2 class=\"md:text-5xl text-3xl\">Why traditional security tools miss AI risk\u003C/h2>\n","\u003Cp>AI use is browser-based activity. A user accessing an LLM, pasting data into a prompt, authorizing an AI agent, installing an AI extension, it all happens inside a browser session.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Your existing tools observe that from the outside. The Push extension observes it from within. That’s why Push can tell you not only that a user visited an AI tool, but, more importantly, what they did there.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1494},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":428,"id":1496,"meta":1497,"component":1498,"responsiveStyles":1502},"builder-0fdd3424c1374c699ecd9483a8e96e60",{"previousId":1484},{"name":428,"tag":428,"options":1499,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":1500,"description":1501,"animatedTitle":37,"reverse":6,"descriptionPaddingHorizontal":118},"\u003Ch2 class=\"md:text-5xl text-3xl\">What Push sees\u003C/h2>\n\u003Ch2 class=\"md:text-5xl text-3xl\">(and helps you secure)\u003C/h2>\n","\u003Cp>Fine-grained browser telemetry gives you real-time visibility into every dimension of AI use.&nbsp;\u003C/p>",{"large":1503},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1505,"meta":1506,"component":1508,"responsiveStyles":1563},"builder-b8a90b55786f4f53886d7558eeb1ba57",{"previousId":1507},"builder-659b8c9f2049420f90bd4b1b722daad1",{"name":250,"options":1509,"isRSC":118},{"columns":1510,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":41},[1511,1536],{"blocks":1512,"width":1535},[1513],{"@type":106,"@version":107,"id":1514,"animations":1515,"component":1529,"responsiveStyles":1532},"builder-3531ea6fc66748c686b001744b4b86cc",[1516],{"trigger":1517,"animation":1518,"steps":1519,"delay":462,"duration":1527,"easing":1528,"repeat":6,"thresholdPercent":462},"scrollInView","fadeIn",[1520,1523],{"id":1521,"isStartState":6,"styles":1522,"delay":462},"74dd072678cb439faab0698ef1902954",{"opacity":124},{"id":1524,"isStartState":6,"styles":1525,"delay":462},"cb7a16594d1244fb978e3136b77860ec",{"opacity":1526},"1",0.4,"cubic-bezier(.37,.01,0,.98)",{"name":340,"options":1530,"isRSC":118},{"text":1531},"\u003Ch3>\u003Cstrong>AI app access&nbsp;\u003C/strong>\u003C/h3>\u003Ch3>\u003Cbr>\u003C/h3>\u003Cp>Know every AI tool your users interact with, sanctioned or otherwise. See who's using what across your environment, and block access where your policy requires it.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>Data inputs to AI apps\u003C/strong>\u003C/h3>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>See what users paste and upload into AI tools as it happens. Not just files. Prompts, snippets, credentials, internal docs. The things that actually matter.\u003C/strong>\u003C/p>",{"large":1533},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":1534,"height":345},"normal",33.333333,{"blocks":1537,"width":1562},[1538],{"@type":106,"@version":107,"id":1539,"animations":1540,"component":1552,"responsiveStyles":1560},"builder-7a32db4cdb87444d92082f1c5298c3cf",[1541],{"trigger":1517,"animation":1542,"steps":1543,"delay":462,"duration":1551,"easing":1528,"repeat":6,"thresholdPercent":462},"fadeInUp",[1544,1548],{"id":1545,"isStartState":6,"styles":1546,"delay":462},"e5aff6df7f3944f68653afc706a612b3",{"opacity":124,"transform":1547},"translate3d(0, 20px, 0)",{"id":1549,"isStartState":6,"styles":1550,"delay":462},"c581f06075eb4c3795b0d46d9e71a257",{"opacity":1526,"transform":140},0.5,{"name":378,"options":1553,"isRSC":118},{"image":1554,"backgroundSize":1555,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":1556,"lockAspectRatio":6,"sizes":1557,"height":1558,"width":1559},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe2862318009a417bb32f2e6d381b71b8?width=760","contain",0.564,"(max-width: 638px) 94vw, (max-width: 998px) 63vw, 55vw",1127,2000,{"large":1561},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},66.666666,{"large":1564},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1565,"marginLeft":345,"marginRight":345,"marginTop":265,"paddingTop":468,"paddingLeft":310,"paddingRight":310,"maxWidth":1566,"paddingBottom":468},"#ffffff","1200px",{"@type":106,"@version":107,"id":1507,"component":1568,"responsiveStyles":1609},{"name":250,"options":1569,"isRSC":118},{"columns":1570,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1571,1591],{"blocks":1572,"width":1562},[1573],{"@type":106,"@version":107,"id":1574,"animations":1575,"component":1584,"responsiveStyles":1589},"builder-7a8e987b06374b0ca904f10e06232b5b",[1576],{"trigger":1517,"animation":1542,"steps":1577,"delay":462,"duration":1551,"easing":1528,"repeat":6,"thresholdPercent":462},[1578,1581],{"id":1579,"isStartState":6,"styles":1580,"delay":462},"a418c92f23a740a9a6b19139f682a418",{"opacity":124,"transform":1547},{"id":1582,"isStartState":6,"styles":1583,"delay":462},"0e0b51bda6e04a4290951562ae018304",{"opacity":1526,"transform":140},{"name":378,"options":1585,"isRSC":118},{"image":1586,"backgroundSize":1555,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":1587,"lockAspectRatio":6,"sizes":1557,"height":1588,"width":1559},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb04073d19c82448aba621a6a8e3bfa9e?width=760",0.464,928,{"large":1590},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"blocks":1592,"width":1535},[1593],{"@type":106,"@version":107,"id":1594,"animations":1595,"component":1604,"responsiveStyles":1607},"builder-aaef4f02ce55436db09924edf4bd7210",[1596],{"trigger":1517,"animation":1518,"steps":1597,"delay":462,"duration":1527,"easing":1528,"repeat":6,"thresholdPercent":462},[1598,1601],{"id":1599,"isStartState":6,"styles":1600,"delay":462},"21a6e9f2c1f64b838c6a4acb767a5acc",{"opacity":124},{"id":1602,"isStartState":6,"styles":1603,"delay":462},"87b7d741aa944a12a3f2f30484e731fc",{"opacity":1526},{"name":340,"options":1605,"isRSC":118},{"text":1606},"\u003Ch3>\u003Cstrong>AI browsers\u003C/strong>\u003C/h3>\u003Ch3>\u003Cbr>\u003C/h3>\u003Cp>New AI-first browsers operate with full user-level access to apps and sessions. Push gives you visibility and control without forcing users into a different environment.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>AI browser extensions\u003C/strong> \u003C/h3>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>AI-powered extensions introduce broad access to page content, sessions, and data. Push detects what’s installed, what it can access, and lets you shut it down.\u003C/p>",{"large":1608},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":1534,"height":345},{"large":1610},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1565,"paddingTop":468,"paddingBottom":468,"maxWidth":1566,"paddingLeft":310,"paddingRight":310,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":1612,"meta":1613,"component":1614,"responsiveStyles":1655},"builder-ccf5a61278744ebb8a31ba1ca9b978c5",{"previousId":1505},{"name":250,"options":1615,"isRSC":118},{"columns":1616,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":41},[1617,1635],{"blocks":1618,"width":1535},[1619],{"@type":106,"@version":107,"id":1620,"animations":1621,"component":1630,"responsiveStyles":1633},"builder-a750a1d2d3b34ac8bbd69eb160dac53d",[1622],{"trigger":1517,"animation":1518,"steps":1623,"delay":462,"duration":1527,"easing":1528,"repeat":6,"thresholdPercent":462},[1624,1627],{"id":1625,"isStartState":6,"styles":1626,"delay":462},"de15f3f386fc4bb3bb5556ffd966e130",{"opacity":124},{"id":1628,"isStartState":6,"styles":1629,"delay":462},"6c3e1c216e4044019b8856cc1cca188a",{"opacity":1526},{"name":340,"options":1631,"isRSC":118},{"text":1632},"\u003Ch3>\u003Cstrong>Desktop AI application downloads\u003C/strong>\u003C/h3>\u003Ch3>\u003Cbr>\u003C/h3>\u003Cp>Users download local AI applications from one place, the browser. Get visibility into who’s downloading what. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>AI agent OAuth connections\u003C/strong> \u003C/h3>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>When an AI tool asks for access to your systems, you see exactly what’s being granted, who approved it, what it can reach, and whether it should even exist at all.\u003C/p>",{"large":1634},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":1534,"height":345},{"blocks":1636,"width":1562},[1637],{"@type":106,"@version":107,"id":1638,"animations":1639,"component":1648,"responsiveStyles":1653},"builder-8452910753174846aa1e042948b33870",[1640],{"trigger":1517,"animation":1542,"steps":1641,"delay":462,"duration":1551,"easing":1528,"repeat":6,"thresholdPercent":462},[1642,1645],{"id":1643,"isStartState":6,"styles":1644,"delay":462},"e702a195ad9d4c1f9995e2f0831a84bc",{"opacity":124,"transform":1547},{"id":1646,"isStartState":6,"styles":1647,"delay":462},"f8225ed7328441a09e46352e714aeaec",{"opacity":1526,"transform":140},{"name":378,"options":1649,"isRSC":118},{"image":1650,"backgroundSize":1555,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":1651,"lockAspectRatio":6,"sizes":1557,"height":1652,"width":1559},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd41f8004b0984479a8d2a30c4e471f95?width=760",0.409,817,{"large":1654},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"large":1656},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1565,"marginTop":265,"paddingTop":468,"maxWidth":1566,"paddingLeft":310,"paddingRight":310,"marginLeft":345,"marginRight":345,"paddingBottom":468},{"@type":106,"@version":107,"id":1658,"meta":1659,"component":1661,"responsiveStyles":1667},"builder-c9c4849f7f0444c1a0a6e00903508c12",{"previousId":1660},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":458,"options":1662,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":1664,"description":1665,"reverse":41,"image":1666},100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. By analyzing how phishing pages behave and how users interact with them, Push uncovers fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":1668,"medium":1670,"small":1671},{"display":140,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":310,"marginTop":265,"backgroundColor":1565},"DM Sans, sans-serif",{"display":140},{"display":140},{"@type":106,"@version":107,"id":1673,"meta":1674,"component":1676,"responsiveStyles":1682},"builder-3666167c88ec442d95772f7d720edb11",{"previousId":1675},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":458,"options":1677,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":1679,"description":1680,"reverse":6,"image":1681},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":1683,"medium":1685,"small":1686},{"display":140,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684,"backgroundColor":1565},"36px",{"display":140},{"display":140},{"@type":106,"@version":107,"layerName":458,"id":1688,"meta":1689,"component":1691,"responsiveStyles":1697},"builder-6fe2b7eddccd4182a22002b295943635",{"previousId":1690},"builder-42c32198083f4880acb37c5cb76934da",{"name":458,"options":1692,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":1694,"description":1695,"reverse":41,"image":1696},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":1698,"medium":1700,"small":1701},{"display":140,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699,"backgroundColor":1565},"47px",{"display":140},{"display":140},{"large":1703},{"width":1704,"marginLeft":1705,"backgroundColor":1565,"display":121,"flexDirection":122},"100vw","calc(50% - 50vw)",{"@type":106,"@version":107,"id":1707,"component":1708,"responsiveStyles":1711},"builder-e23db486f505454fa5b66a987df54314",{"name":496,"options":1709,"isRSC":118},{"code":1710,"scriptsClientOnly":6},"\u003Cdiv class=\"section-container\" id=\"section\">\n  \u003Cdiv class=\"white-layer\">\u003C/div>\n  \u003Cdiv class=\"red-layer\">\u003C/div>\n  \u003Cdiv class=\"bg-dark-layer\">\n    \u003C!-- your content here -->\n  \u003C/div>\n\u003C/div>\n",{"large":1712},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":1704},{"@type":106,"@version":107,"id":1714,"class":1715,"children":1716,"responsiveStyles":1728},"builder-6403c634ec7a4dab8b45a032c842accb","box-2",[1717],{"@type":106,"@version":107,"layerName":428,"id":1718,"meta":1719,"component":1721,"responsiveStyles":1725},"builder-dc7dd62a09494944acb5bcc7b04dccea",{"previousId":1720},"builder-5788b58f751946f8a2de1d5a5947c9b1",{"name":428,"tag":428,"options":1722,"isRSC":118},{"darkMode":41,"maxWidth":430,"maxTextWidth":1489,"title":1723,"description":1724,"animatedTitle":37,"reverse":6,"descriptionPaddingHorizontal":118},"\u003Ch2 class=\"md:text-5xl text-3xl\">Why the browser is the right layer for AI security\u003C/h2>\n","\u003Cp style=\"max-width: 700px; margin-left:auto; margin-right:auto;\">AI didn’t create a problem. It exposed one.\u003C/p>\n\u003Cp style=\"max-width: 700px; margin-left:auto; margin-right:auto;\">Every meaningful interaction, like prompts, permissions, or data movement, happens inside a browser session. Until you can see inside that session, you’re guessing.\u003C/p>\n\u003Cp>\u003Cbr />\u003C/p>\n\u003Cp style=\"max-width: 700px; margin-left:auto; margin-right:auto;\">Push gives you visibility in minutes, inside the browsers your team already uses, with nothing disruptive to roll out.\u003C/p>\n\n\u003Ca href=\"https://pushsecurity.com/demo/\" builder-id=\"builder-7271ea37e26643e5a79fa9a7c4049be6\" style=\"\" class=\"builder-7271ea37e26643e5a79fa9a7c4049be6 builder-block\"\n  >\u003C!--[-->\u003C!--[-->\u003C!--[-->\n  \u003Cdiv class=\"flex justify-center mt-8\">\n    \u003Ca href=\"/demo/\" target=\"_self\"\n      >\u003Cbutton class=\"flex items-center justify-center gap-2 whitespace-nowrap disabled:cursor-not-allowed p-btn-web-orange w-[193px] p-btn-rounded-base\" aria-label=\"See The Gaps\">\u003C!---->See The Gaps\u003C!---->\u003C!---->\u003C/button>\u003C/a\n    >\n  \u003C/div>\n  \u003C!--]-->\u003C!--]-->\u003C!--]-->\u003C/a\n>\n",{"large":1726},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1727},"#000000",{"large":1729},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"height":444,"backgroundColor":1727,"paddingTop":468},{"id":1731,"@type":106,"tagName":131,"properties":1732,"responsiveStyles":1733},"builder-pixel-7rxvesgftdf",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1734},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1736},{"path":37,"query":1737},{},{},1775833539352,1775666350820,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F20b3994b6823417dae0468da4350d6bd","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":1745,"kind":228,"breakpoints":1746,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/resources/ai-starts-browser?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=f21fd76b02fc4a5fb0e5e7fa38ce81b4&builder.overrides.f21fd76b02fc4a5fb0e5e7fa38ce81b4=f21fd76b02fc4a5fb0e5e7fa38ce81b4&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1748,"id":593,"name":1749,"modelId":235,"published":13,"query":1750,"data":1753,"variations":1842,"lastUpdated":1843,"firstPublished":1844,"testRatio":33,"screenshot":1845,"createdBy":53,"lastUpdatedBy":72,"folders":1846,"meta":1847,"rev":408},1758213253920,"MFA whitepaper",[1751],{"@type":162,"property":163,"operator":164,"value":1752},"/resources/mfa-regulation-compliance",{"coverImage":1754,"seoDescription":1755,"themeId":6,"description":1755,"seoTitle":1756,"type":420,"title":1756,"blocks":1757,"url":1752,"state":1839},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa60e1917d8c24eb6ad5fbebf53bfbbc0","MFA coverage is being increasingly scrutinized by regulators and insurance providers. Learn how cyber breaches are shaping the future of MFA compliance.","Are you confident in your MFA coverage?",[1758,1834],{"@type":106,"@version":107,"id":1274,"meta":1759,"component":1761,"responsiveStyles":1832},{"previousId":1760},"builder-79c24cb486d64c9a8a239bf77ec8ccf3",{"name":250,"options":1762,"isRSC":118},{"columns":1763,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1764],{"blocks":1765},[1766,1816,1824],{"@type":106,"@version":107,"id":1767,"component":1768,"responsiveStyles":1814},"builder-917faffbc61542fc9da5e0315036348c",{"name":250,"options":1769,"isRSC":118},{"columns":1770,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1771,1799],{"blocks":1772},[1773,1781,1789],{"@type":106,"@version":107,"layerName":260,"id":1774,"meta":1775,"component":1776,"responsiveStyles":1779},"builder-254e0dc15e1e4a99916b7f2a46876004",{"previousId":522},{"name":260,"tag":260,"options":1777,"isRSC":118},{"title":1778},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Whitepaper: \u003C/span>\u003Cspan style=\"color: rgb(255, 72, 37);\">Are you confident in your MFA coverage?\u003C/span>\u003C/p>",{"large":1780},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginBottom":266},{"@type":106,"@version":107,"id":1782,"meta":1783,"component":1784,"responsiveStyles":1787},"builder-2b9db8aa25e44404a73b110f216d7d96",{"previousId":531},{"name":533,"tag":533,"options":1785,"isRSC":118},{"description":1786},"\u003Cp>Many businesses think they’ve “solved MFA.” It’s rolled out across core apps, enforced at the IdP, and backed by policy. But public breaches tell a different story.\u003C/p>\u003Cp>Our research shows 2 in 5 corporate accounts are missing a second authentication factor. That leaves business apps exposed to weak or stolen passwords — easy prey for attackers, and enough to open the door to data theft, ransomware, and extortion.\u003C/p>\u003Cp>This whitepaper outlines how MFA enforcement is shaping compliance, insurance, and cyber resilience, and how leaders can close the gap.\u003C/p>",{"large":1788},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1790,"meta":1791,"component":1793,"responsiveStyles":1796},"builder-66a834ccd2c54e639cd7a621bf3991b3",{"previousId":1792},"builder-bfe6184c1f714e5a810cb1c05cfd4622",{"name":351,"tag":351,"options":1794,"isRSC":118},{"text":87,"align":267,"size":142,"download":1795},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc84a6307f11d4e4abf4e8597421f11cf?alt=media&token=34b2b549-5c96-4a29-a6d1-730d45b1cdbb&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":1797},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1798,"paddingBottom":1798},"24px",{"blocks":1800},[1801],{"@type":106,"@version":107,"id":1802,"meta":1803,"component":1805,"responsiveStyles":1811},"builder-5948a48647f94c63bacede978a18e5ee",{"previousId":1804},"builder-fc08fd0b327d4063a3f19d70e541fe9b",{"name":378,"options":1806,"isRSC":118},{"image":1807,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":1808,"lockAspectRatio":6,"height":1809,"width":1559,"sizes":1810},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcf09ede676234988a39769708733838e?width=650",0.9145,1499,"(max-width: 998px) 46vw, 47vw",{"large":1812,"small":1813},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":265,"marginLeft":345,"marginRight":345,"paddingLeft":333,"paddingRight":333,"marginBottom":268},{"display":140},{"large":1815},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":1817,"meta":1818,"component":1819,"responsiveStyles":1821},"builder-d1255c8973da4b0c94351baea3c00710",{"previousId":558},{"name":366,"tag":366,"options":1820,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":1822,"small":1823},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310,"paddingTop":297,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":1825,"meta":1826,"component":1827,"responsiveStyles":1830},"builder-b805faa81c3040e8895856a9b9cd0ed6",{"previousId":567},{"name":378,"options":1828,"isRSC":118},{"image":1351,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":1829},"(max-width: 638px) 90vw, (max-width: 998px) 93vw, 95vw",{"large":1831},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":1833},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":268},{"id":1835,"@type":106,"tagName":131,"properties":1836,"responsiveStyles":1837},"builder-pixel-ua1n6smgv7j",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1838},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1840},{"path":37,"query":1841},{},{},1773656465106,1758269174170,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb71ece5fc82b462a81a99d3f10f7de86",[],{"kind":228,"lastPreviewUrl":1848,"breakpoints":1849,"hasLinks":6,"winningTest":118,"originalContentId":1850,"hasAutosaves":6},"https://pushsecurity.com/resources/mfa-regulation-compliance?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=11d8de1c34044e0c92bddd59ba4741b1&builder.overrides.11d8de1c34044e0c92bddd59ba4741b1=11d8de1c34044e0c92bddd59ba4741b1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"8fe412a000ad437486d017b87d321bf2",{"createdDate":1852,"id":1853,"name":1854,"modelId":235,"published":13,"query":1855,"data":1858,"variations":1944,"lastUpdated":1945,"firstPublished":1946,"testRatio":33,"screenshot":1947,"createdBy":53,"lastUpdatedBy":72,"folders":1948,"meta":1949,"rev":408},1757680700265,"e98d7ce297a84909aa25383a2cfbaeda","Push Security Brochure Q3 2025",[1856],{"@type":162,"property":163,"operator":164,"value":1857},"/resources/product-brochure",{"title":1859,"seoTitle":1859,"ogImage":1860,"seoDescription":1861,"themeId":6,"coverImage":1860,"inputs":1862,"type":420,"description":1861,"blocks":1863,"url":1857,"state":1941},"Push Security Product Brochure","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F672743fb7fa94da7b70009081bc71669","The browser has become the new endpoint. Push Security is the new EDR. Download the brochure to learn why security teams are choosing Push.",[],[1864,1936],{"@type":106,"@version":107,"id":1865,"meta":1866,"component":1868,"responsiveStyles":1934},"builder-c315917217374091949d19b275f200e2",{"previousId":1867},"builder-aa2f35da60464c61aaba165d6ff4f29f",{"name":250,"options":1869,"isRSC":118},{"columns":1870,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1871],{"blocks":1872},[1873,1919,1927],{"@type":106,"@version":107,"id":1874,"component":1875,"responsiveStyles":1917},"builder-f436643d15bd45c4b074d90069a224ef",{"name":250,"options":1876,"isRSC":118},{"columns":1877,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1878,1902],{"blocks":1879},[1880,1887,1894],{"@type":106,"@version":107,"layerName":260,"id":1881,"component":1882,"responsiveStyles":1885},"builder-2ab69f3c1fa64a22a73f264261cc1178",{"name":260,"tag":260,"options":1883,"isRSC":118},{"title":1884},"\u003Cp>Product Brochure: \u003C/p>\u003Cp>\u003Cspan style=\"color: rgb(241, 54, 15);\">Browser-based Detection &amp; Response\u003C/span>\u003C/p>",{"large":1886},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":274},{"@type":106,"@version":107,"id":1888,"component":1889,"responsiveStyles":1892},"builder-1324a23194d549d0806c04654997e022",{"name":533,"tag":533,"options":1890,"isRSC":118},{"description":1891},"\u003Cp>Modern work has moved into the browser. But for most organizations, security hasn’t followed.\u003C/p>\n\u003Cp>The result? Attackers are using a range of techniques to target users in their browsers, without even touching an endpoint or their network.\u003C/p>\n\u003Cp>Realizing security teams lacked the visibility and control to counter this threat, we set our mission: to build \u003Cstrong>the most advanced security tool in the browser\u003C/strong>.\u003C/p>\n\u003Cp>The browser has become the new endpoint. Push Security is the new EDR. Download the brochure to learn why security teams are choosing Push.\u003C/p>\n",{"large":1893},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1792,"meta":1895,"component":1897,"responsiveStyles":1900},{"previousId":1896},"builder-e2f40437f1a949bab5474c0dc6c71bd3",{"name":351,"tag":351,"options":1898,"isRSC":118},{"text":87,"align":267,"size":142,"download":1899},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffbb478e6785340f7956e314b280fbb62?alt=media&token=1ad7ce97-db2c-475b-a413-8e085e3709e8&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":1901},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1798,"paddingBottom":1798},{"blocks":1903},[1904],{"@type":106,"@version":107,"id":1905,"meta":1906,"component":1908,"responsiveStyles":1914},"builder-fce9756425914cdf82195acd85b15f41",{"previousId":1907},"builder-113b642557294ba299c6d6f3c280b714",{"name":378,"options":1909,"isRSC":118},{"image":1910,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":1911,"lockAspectRatio":6,"height":1912,"width":1913,"sizes":1810},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffdf2d84fe1f043e586d28eeb90055174?width=650",0.8866,1085,1448,{"large":1915,"small":1916},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":265,"marginLeft":345,"marginRight":345,"paddingLeft":333,"paddingRight":333,"marginBottom":268},{"display":140},{"large":1918},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":1920,"meta":1921,"component":1922,"responsiveStyles":1924},"builder-cd5a7df7f82d4175b1567bce2670a6c7",{"previousId":558},{"name":366,"tag":366,"options":1923,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":1925,"small":1926},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310,"paddingTop":265,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":1928,"meta":1929,"component":1930,"responsiveStyles":1932},"builder-a0a3e43d5709437aa391a7851a2a4de2",{"previousId":567},{"name":378,"options":1931,"isRSC":118},{"image":1351,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":1829},{"large":1933},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":1935},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1937,"@type":106,"tagName":131,"properties":1938,"responsiveStyles":1939},"builder-pixel-uzs9f6u12u",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1940},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1942},{"path":37,"query":1943},{},{},1773655889999,1757681989364,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6117e779c1b641b6881f3d8a5a758fb7",[],{"hasLinks":6,"winningTest":118,"kind":228,"breakpoints":1950,"lastPreviewUrl":1951,"originalContentId":1952,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/product-brochure?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=e98d7ce297a84909aa25383a2cfbaeda&builder.overrides.e98d7ce297a84909aa25383a2cfbaeda=e98d7ce297a84909aa25383a2cfbaeda&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default","b24c9314f0d642948c7b7acddee731dc",{"createdDate":1954,"id":1955,"name":1956,"modelId":235,"published":13,"query":1957,"data":1960,"variations":2082,"lastUpdated":2083,"firstPublished":2084,"testRatio":33,"screenshot":2085,"createdBy":34,"lastUpdatedBy":72,"folders":2086,"meta":2087,"rev":408},1762274429857,"db2d3baa2e014fb0adce1e6dff0768ca","Decipher podcast appearance",[1958],{"@type":162,"property":163,"operator":164,"value":1959},"/resources/decipher-sep-2025",{"description":1961,"private":6,"seoTitle":1962,"coverImage":1963,"themeId":6,"type":1001,"title":1962,"seoDescription":1961,"blocks":1964,"url":1959,"state":2079},"Adam Bateman, co-founder and CEO of Push Security, joins Dennis Fisher to talk about a new, highly targeted phishing campaign the company uncovered that uses compromised LinkedIn accounts.","New Targeted Phishing Attack Trends With Adam Bateman of Push Security","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F15da1f6f23fb441591f155f7aee1a404",[1965,1985,2057,2066,2074],{"@type":106,"@version":107,"id":1966,"meta":1967,"component":1968,"responsiveStyles":1982},"builder-2cc07e99e376472f912d5cc3cf441dad",{"previousId":1007},{"name":250,"options":1969,"isRSC":118},{"columns":1970,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1971],{"blocks":1972},[1973],{"@type":106,"@version":107,"id":1974,"meta":1975,"component":1976,"responsiveStyles":1979},"builder-c20745f373b04a62910d37fc8a6d2075",{"previousId":258},{"name":260,"tag":260,"options":1977,"isRSC":118},{"title":1978,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(242, 54, 18);\">New Targeted Phishing Attack Trends:\u003C/span> With Adam Bateman of Push Security\u003C/p>",{"large":1980,"small":1981},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":1983,"small":1984},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":1986,"meta":1987,"component":1988,"responsiveStyles":2054},"builder-05f10e2cc044495c9f4433ea6aae5a67",{"previousId":1027},{"name":250,"options":1989,"isRSC":118},{"columns":1990,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[1991,2011],{"blocks":1992,"width":311},[1993,2001],{"@type":106,"@version":107,"id":1994,"meta":1995,"component":1996,"responsiveStyles":1999},"builder-bee4bc3ae2154af989c018858003874f",{"previousId":290},{"name":292,"options":1997,"isRSC":118},{"videoId":1998},"Ihgd5aD6x8o",{"large":2000},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2002,"component":2003,"responsiveStyles":2009},"builder-bd7ba3123ec649ae9fa661be7f394e8b",{"name":301,"options":2004,"isRSC":118},{"options":2005},[2006],{"optionTitle":2007,"description":2008},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Adam Bateman Interview\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 14px;\">Adam Bateman, co-founder and CEO of Push Security, joins Dennis Fisher to talk about a new, highly targeted phishing campaign the company uncovered that uses compromised LinkedIn accounts in order to harvest victims' Google or Microsoft credentials through a fake investment, then discuss trends in browser-based attacks and defensive challenges.\u003C/span>\u003C/p>",{"large":2010},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":2012,"width":357},[2013,2039,2047],{"@type":106,"@version":107,"id":2014,"component":2015,"responsiveStyles":2036},"builder-cef43aa5454b4be2862b2ae0c9235886",{"name":317,"options":2016,"isRSC":118},{"hosts":2017},[2018],{"host":2019},{"@type":17,"id":2020,"model":190,"value":2021},"966fb31fced64c838cc293aeb0e2b159",{"lastUpdatedBy":34,"folders":2022,"data":2023,"modelId":194,"query":2028,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":2032,"variations":2033,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},"Co-Founder / CEO","Bateman","Adam","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3f282465c7db4e8ab88cc891d4920fb7",[],1728048666203,1728048666212,1728048496719,{"kind":36,"lastPreviewUrl":37},{},"Adam bateman","r05edl64vxo",{"large":2037,"small":2038},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":2040,"meta":2041,"component":2042,"responsiveStyles":2045},"builder-fb884e44cb224355958d763d35070a6c",{"previousId":338},{"name":340,"options":2043,"isRSC":118},{"text":2044},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Adam and the team?\u003C/span>\u003C/p>",{"large":2046},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2048,"meta":2049,"component":2050,"responsiveStyles":2052},"builder-6dfa94d8240e4525a795be2a2b318336",{"previousId":349},{"name":351,"tag":351,"options":2051,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2053},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2055,"small":2056},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2058,"meta":2059,"component":2060,"responsiveStyles":2063},"builder-fc9690ba13f7419d823d257383a85d70",{"previousId":1100},{"name":366,"tag":366,"options":2061,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2062},[],{"large":2064,"small":2065},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2067,"meta":2068,"component":2069,"responsiveStyles":2071},"builder-67f8749f5b3c484a9b69100012a193de",{"previousId":1109},{"name":378,"options":2070,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":2072,"small":2073},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2075,"@type":106,"tagName":131,"properties":2076,"responsiveStyles":2077},"builder-pixel-h0l0iq9nuy",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2078},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2080},{"path":37,"query":2081},{},{},1762274791277,1762274791250,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe63fcfacc3f443fbb473bba9d75cc44e",[],{"winningTest":118,"originalContentId":992,"breakpoints":2088,"lastPreviewUrl":2089,"kind":228,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/decipher-sep-2025?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=db2d3baa2e014fb0adce1e6dff0768ca&builder.overrides.db2d3baa2e014fb0adce1e6dff0768ca=db2d3baa2e014fb0adce1e6dff0768ca&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":2091,"id":2092,"name":2093,"modelId":235,"published":13,"meta":2094,"query":2097,"data":2100,"variations":2224,"lastUpdated":2225,"firstPublished":2226,"testRatio":33,"screenshot":2227,"createdBy":34,"lastUpdatedBy":72,"folders":2228,"rev":408},1755160144172,"001f7c00d40448b5b1fa730f4977f018","On-demand webinar: IR Playbooks",{"originalContentId":1135,"lastPreviewUrl":2095,"kind":228,"winningTest":118,"breakpoints":2096,"hasLinks":6},"https://pushsecurity.com/resources/incident-response-webinar?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=001f7c00d40448b5b1fa730f4977f018&builder.overrides.001f7c00d40448b5b1fa730f4977f018=001f7c00d40448b5b1fa730f4977f018&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},[2098],{"@type":162,"property":163,"operator":164,"value":2099},"/resources/incident-response-webinar",{"type":243,"seoDescription":2101,"private":6,"title":2102,"coverImage":2103,"themeId":6,"ogImage":2104,"seoTitle":2102,"description":2101,"blocks":2105,"url":2099,"state":2221},"Identity attacks have changed a lot in recent years, which means how security teams investigate and respond to them has had to adapt. ","On-demand Webinar: Identity attacks have changed — have your IR playbooks?","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F972308ba459b4afd97aaa3356a504f8b","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff95dfe6556743a1b64cae8807f8d494",[2106,2126,2199,2208,2216],{"@type":106,"@version":107,"id":2107,"meta":2108,"component":2109,"responsiveStyles":2123},"builder-798f16cd2cf9433c8c3cb12b24db80d0",{"previousId":1147},{"name":250,"options":2110,"isRSC":118},{"columns":2111,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2112],{"blocks":2113},[2114],{"@type":106,"@version":107,"id":2115,"meta":2116,"component":2117,"responsiveStyles":2120},"builder-7c9e64b24e0c4d539873c45622904e3a",{"previousId":258},{"name":260,"tag":260,"options":2118,"isRSC":118},{"title":2119,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Identity Attacks Have Changed\u003C/span> —\u003C/p>\u003Cp>Have Your IR Playbooks?\u003C/p>",{"large":2121,"small":2122},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":2124,"small":2125},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2127,"meta":2128,"component":2129,"responsiveStyles":2196},"builder-286e655b46f74ced8e1bf2874ffa92d5",{"previousId":1167},{"name":250,"options":2130,"isRSC":118},{"columns":2131,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2132,2152],{"blocks":2133,"width":311},[2134,2142],{"@type":106,"@version":107,"id":2135,"meta":2136,"component":2137,"responsiveStyles":2140},"builder-c729b525a7d044948ab5eb14a6166659",{"previousId":290},{"name":292,"options":2138,"isRSC":118},{"videoId":2139},"iztkt6dW7pk",{"large":2141},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2143,"component":2144,"responsiveStyles":2150},"builder-dad9313239884b0c9b28fd3f51eff86f",{"name":301,"options":2145,"isRSC":118},{"options":2146},[2147],{"optionTitle":2148,"description":2149},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003C/p>","\u003Cp>Identity attacks have changed a lot in recent years, which means how security teams investigate and respond to them has had to adapt.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Push Security’s Josh Gideon went from executing sophisticated identity attacks as a Security Consultant to defending against them on the front lines as Director of Security Operations. Join him for our latest webinar where he’ll take you through:\u003C/p>\u003Cp>How identity attacks have evolved from the days of AD attacks.\u003C/p>\u003Cul>\u003Cli>What investigation and response used to look like, and the challenges that modern identity brings to traditional tools and processes.\u003C/li>\u003Cli>Step-by-step walkthrough of using the Push platform to investigate and respond to modern identity attack scenarios, from analyzing the timeline of a browser-based phishing attack, to investigating the blast radius of a compromised identity.\u003C/li>\u003Cli>How Push customers are using browser telemetry to detect and respond to attacks and remediate identity vulnerabilities.\u003C/li>\u003C/ul>",{"large":2151},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":2153,"width":357},[2154,2181,2189],{"@type":106,"@version":107,"id":2155,"component":2156,"responsiveStyles":2178},"builder-a608b24ceb9b4fad8ae4a90e091eacf8",{"name":317,"options":2157,"isRSC":118},{"hosts":2158},[2159],{"host":2160},{"@type":17,"id":2161,"model":190,"value":2162},"f811992483e94c9091267614bb8d7f06",{"createdDate":2163,"id":2161,"name":2164,"modelId":194,"published":13,"meta":2165,"query":2167,"data":2168,"variations":2173,"lastUpdated":2174,"firstPublished":2175,"testRatio":33,"createdBy":72,"lastUpdatedBy":72,"folders":2176,"rev":2177},1752484460457,"Josh Gideon",{"breakpoints":2166,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"name":2169,"surname":2170,"avatar":2171,"jobtitle":2172},"Josh","Gideon","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9359ee77c2c2407c9bc89080c70301b0","Product Team",{},1752484551101,1752484551093,[],"cd2c7nqyal",{"large":2179,"small":2180},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":2182,"meta":2183,"component":2184,"responsiveStyles":2187},"builder-65144c8a3a45427e9231c96c4a71ccd5",{"previousId":338},{"name":340,"options":2185,"isRSC":118},{"text":2186},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Josh and the team?\u003C/span>\u003C/p>",{"large":2188},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2190,"meta":2191,"component":2192,"responsiveStyles":2194},"builder-7641161bf4744809998e7ed5b6768343",{"previousId":349},{"name":351,"tag":351,"options":2193,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2195},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2197,"small":2198},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2200,"meta":2201,"component":2202,"responsiveStyles":2205},"builder-2e6301b2cc0449ab8c3a7817d2b089d7",{"previousId":1229},{"name":366,"tag":366,"options":2203,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2204},[],{"large":2206,"small":2207},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2209,"meta":2210,"component":2211,"responsiveStyles":2213},"builder-87314c7bd7fc4ad59fbef5332f56ec84",{"previousId":1238},{"name":378,"options":2212,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":2214,"small":2215},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2217,"@type":106,"tagName":131,"properties":2218,"responsiveStyles":2219},"builder-pixel-3v5bceku4ft",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2220},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2222},{"path":37,"query":2223},{},{},1755160939124,1755160860747,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e1164d3213e4d0b9d4293398c696630",[],{"createdDate":2230,"id":1850,"name":2231,"modelId":235,"published":13,"query":2232,"data":2235,"variations":2343,"lastUpdated":2344,"firstPublished":2345,"testRatio":33,"screenshot":2346,"createdBy":53,"lastUpdatedBy":72,"folders":2347,"meta":2348,"rev":408},1754470096802,"Evolution of phishing attacks whitepaper",[2233],{"@type":162,"property":163,"operator":164,"value":2234},"/resources/phishing-evolution",{"themeId":6,"description":2236,"type":420,"coverImage":2237,"ogImage":2238,"seoDescription":2236,"title":2239,"seoTitle":2239,"blocks":2240,"url":2234,"state":2340},"How modern phishing tools and techniques have changed the game — and what security teams can do to level the playing field. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa3067fdecce04413a0ca00d4d53705c5","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2da55ebed8784b28a8b6966afd57ce77","The evolution of phishing attacks",[2241,2335],{"@type":106,"@version":107,"id":1760,"meta":2242,"component":2244,"responsiveStyles":2333},{"previousId":2243},"builder-163e89fd994445e2a69f10ad926beb21",{"name":250,"options":2245,"isRSC":118},{"columns":2246,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2247],{"blocks":2248},[2249,2257,2317,2325],{"@type":106,"@version":107,"layerName":260,"id":2250,"meta":2251,"component":2252,"responsiveStyles":2255},"builder-2882d2be12a040818d893c9828288586",{"previousId":522},{"name":260,"tag":260,"options":2253,"isRSC":118},{"title":2254},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Whitepaper: \u003C/span>\u003Cspan style=\"color: rgb(255, 72, 37);\">The evolution of phishing attacks\u003C/span>\u003C/p>",{"large":2256},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginBottom":266},{"@type":106,"@version":107,"id":2258,"component":2259,"responsiveStyles":2315},"builder-95bc3f9690b04ff6a908802776754470",{"name":250,"options":2260,"isRSC":118},{"columns":2261,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2262,2290],{"blocks":2263},[2264,2272],{"@type":106,"@version":107,"id":2265,"meta":2266,"component":2267,"responsiveStyles":2270},"builder-717c8aa9eea04fdd9da96d5c24cd1e64",{"previousId":531},{"name":533,"tag":533,"options":2268,"isRSC":118},{"description":2269},"\u003Cp>Modern phishing has changed a lot in the past decade or so. MFA-bypassing&nbsp;Attacker-in-the-Middle (AitM) kits are table stakes — anyone can pick up a copy of Evilginx and immediately blow past most email and network security solutions on the market.&nbsp;&nbsp;\u003C/p>\u003Cp>But the most sophisticated attacks — the ones that usually hit the headlines in the form of major breaches — are doing much more than this. The latest generation of fully customized AitM phishing kits are dynamically obfuscating the code that loads the web page, implementing bot protection through custom CAPTCHA, and using runtime anti-analysis features, making them increasingly difficult to detect by the tools most enterprises are using to combat the problem.&nbsp;\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(249, 173, 44);\">Read our analysis of how modern phishing tools and techniques have changed the game — and what security teams can do to level the playing field. \u003C/strong>\u003C/p>",{"large":2271},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1306,"meta":2273,"component":2275,"responsiveStyles":2287},{"previousId":2274},"builder-e86e541a541746429ecc6399a5854839",{"name":317,"options":2276,"isRSC":118},{"hosts":2277},[2278],{"host":2279},{"@type":17,"id":1061,"model":190,"value":2280},{"createdDate":1063,"id":1061,"name":1064,"modelId":194,"published":13,"query":2281,"data":2282,"variations":2283,"lastUpdated":1072,"firstPublished":1073,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":2284,"meta":2285,"rev":1077},[],{"name":1067,"jobtitle":1068,"avatar":1069,"surname":1070},{},[],{"breakpoints":2286,"kind":36,"winningTest":118,"lastPreviewUrl":37,"originalContentId":788,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"large":2288,"small":2289},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingTop":265,"marginTop":265},{"display":140},{"blocks":2291},[2292,2305],{"@type":106,"@version":107,"id":2293,"meta":2294,"component":2296,"responsiveStyles":2303},"builder-44bdc9cb8aa44372945aa811453e727b",{"previousId":2295},"builder-5637466709ce44e0a0833a638cd72554",{"name":378,"options":2297,"isRSC":118},{"image":2298,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":2299,"lockAspectRatio":6,"height":2300,"width":2301,"sizes":2302},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2da55ebed8784b28a8b6966afd57ce77?width=650",0.472,578,1224,"(max-width: 638px) 88vw, (max-width: 998px) 46vw, 47vw",{"large":2304},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"paddingBottom":265,"marginBottom":310,"marginLeft":310,"marginTop":297,"marginRight":310},{"@type":106,"@version":107,"id":2306,"meta":2307,"component":2309,"responsiveStyles":2312},"builder-4686644836834ee39c1aa1e34d255a3a",{"previousId":2308},"builder-a7c100522a5441a68c12c2b1ab537538",{"name":351,"tag":351,"options":2310,"isRSC":118},{"text":87,"align":267,"size":142,"download":2311},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8011cf85f20243ed92ba28f283a6508f?alt=media&token=41426f65-6e68-4357-b290-59f4821e59a1&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":2313},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":2314,"paddingBottom":2314},"12px",{"large":2316},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":2318,"meta":2319,"component":2320,"responsiveStyles":2322},"builder-7f20f8d4f1aa45c584168ff62ac4324b",{"previousId":558},{"name":366,"tag":366,"options":2321,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":2323,"small":2324},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310,"paddingTop":297,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":2326,"meta":2327,"component":2328,"responsiveStyles":2331},"builder-cd109d040a434fae972de8a58abb8b66",{"previousId":567},{"name":378,"options":2329,"isRSC":118},{"image":1351,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2330},"(max-width: 638px) 88vw, (max-width: 998px) 93vw, 95vw",{"large":2332},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":2334},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":268},{"id":2336,"@type":106,"tagName":131,"properties":2337,"responsiveStyles":2338},"builder-pixel-b5r93ezky3w",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2339},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2341},{"path":37,"query":2342},{},{},1765481277199,1754471285522,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb008f64878524ba5aa2417216a06d903",[],{"kind":228,"originalContentId":2349,"breakpoints":2350,"lastPreviewUrl":2351,"winningTest":118,"hasLinks":6,"hasAutosaves":6},"71c2375c0b254c80b7afaf50aa23bbf8",{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/phishing-evolution?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=8fe412a000ad437486d017b87d321bf2&builder.overrides.8fe412a000ad437486d017b87d321bf2=8fe412a000ad437486d017b87d321bf2&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":2353,"id":1135,"name":2354,"modelId":235,"published":13,"meta":2355,"query":2359,"data":2362,"variations":2474,"lastUpdated":2475,"firstPublished":2476,"testRatio":33,"screenshot":2477,"createdBy":34,"lastUpdatedBy":72,"folders":2478,"rev":408},1748438471781,"On-demand webinar: Scattered Spider",{"breakpoints":2356,"lastPreviewUrl":2357,"originalContentId":2358,"hasLinks":6,"kind":228,"winningTest":118},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/scattered-spider?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=86a1ecd81cbf402eb9ceaab5cc168aeb&builder.overrides.86a1ecd81cbf402eb9ceaab5cc168aeb=86a1ecd81cbf402eb9ceaab5cc168aeb&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default","1b431ce89d4f41b88a1823cba99b1fd1",[2360],{"@type":162,"property":163,"operator":164,"value":2361},"/resources/scattered-spider",{"themeId":6,"seoTitle":2363,"type":243,"seoDescription":2364,"title":2363,"description":2364,"private":6,"ogImage":2365,"coverImage":2366,"blocks":2367,"url":2361,"state":2471},"On-demand Webinar: Scattered Spider TTP Evolution in 2025","How Scattered Spider TTPs have evolved since 2022 and their latest methods in 2025.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F05e85634aa9f485ea3c47672a06d623a","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcb9360eed5214c489a86277ff8d2fb2f",[2368,2387,2449,2458,2466],{"@type":106,"@version":107,"id":1147,"meta":2369,"component":2370,"responsiveStyles":2384},{"previousId":1167},{"name":250,"options":2371,"isRSC":118},{"columns":2372,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2373],{"blocks":2374},[2375],{"@type":106,"@version":107,"id":2376,"meta":2377,"component":2378,"responsiveStyles":2381},"builder-9c386505d82a42858de2292ecf70d1a6",{"previousId":258},{"name":260,"tag":260,"options":2379,"isRSC":118},{"title":2380,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Scattered Spider\u003C/span> — TTP Evolution in 2025\u003C/p>",{"large":2382,"small":2383},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":2385,"small":2386},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":1167,"meta":2388,"component":2390,"responsiveStyles":2446},{"previousId":2389},"builder-c91006f3262e422eb5e753fd26a2a72e",{"name":250,"options":2391,"isRSC":118},{"columns":2392,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2393,2413],{"blocks":2394,"width":311},[2395,2403],{"@type":106,"@version":107,"id":2396,"meta":2397,"component":2398,"responsiveStyles":2401},"builder-afecfe6b3b7c45378a518d1c80611d8c",{"previousId":290},{"name":292,"options":2399,"isRSC":118},{"videoId":2400},"LHBIgfWAj08",{"large":2402},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2404,"component":2405,"responsiveStyles":2411},"builder-91acd7cf382d4e7193115293984e7a1f",{"name":301,"options":2406,"isRSC":118},{"options":2407},[2408],{"optionTitle":2409,"description":2410},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Scattered Spider\u003C/span>\u003C/p>","\u003Cp>Scattered Spider are known for their use of identity-based techniques, specialising in account takeover through stolen credentials, phishing, and advanced social engineering such as help desk scams. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>After compromising identity infrastructure, they pivot to server environments on-premises and in the cloud and deploy ransomware for financial gain.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Join Luke Jennings, VP R&amp;D, as he:\u003C/p>\u003Cul>\u003Cli>Breaks down Scattered Spider’s latest TTPs for 2025\u003C/li>\u003Cli>Analyses Scattered Spider phishing toolkits\u003C/li>\u003Cli>Advises how to counteract Scattered Spider’s identity-based methods\u003C/li>\u003Cli>Demonstrates how Push detects and responds to Scattered Spider TTPs\u003C/li>\u003C/ul>",{"large":2412},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":2414,"width":357},[2415,2432,2439],{"@type":106,"@version":107,"id":2416,"component":2417,"responsiveStyles":2429},"builder-207773fc69cc4ed2868fa279ccc8b048",{"name":317,"options":2418,"isRSC":118},{"hosts":2419},[2420],{"host":2421},{"@type":17,"id":788,"model":190,"value":2422},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":2423,"data":2424,"variations":2425,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":2426,"meta":2427,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":2428,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":2430,"small":2431},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":2433,"meta":2434,"component":2435,"responsiveStyles":2437},"builder-b49bc6219ba946a99c6488bc8d8a4f54",{"previousId":338},{"name":340,"options":2436,"isRSC":118},{"text":813},{"large":2438},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2440,"meta":2441,"component":2442,"responsiveStyles":2444},"builder-98c4cbbe9793433a891abf997c52be50",{"previousId":349},{"name":351,"tag":351,"options":2443,"isRSC":118},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2445},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2447,"small":2448},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":1229,"meta":2450,"component":2452,"responsiveStyles":2455},{"previousId":2451},"builder-0406be7a86b44a24a8ba0f4e686410b6",{"name":366,"tag":366,"options":2453,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2454},[],{"large":2456,"small":2457},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":1238,"meta":2459,"component":2461,"responsiveStyles":2463},{"previousId":2460},"builder-e760ca7d2b0c450e83b7d733436ed861",{"name":378,"options":2462,"isRSC":118},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":2464,"small":2465},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2467,"@type":106,"tagName":131,"properties":2468,"responsiveStyles":2469},"builder-pixel-j691qcyjo6",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2470},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2472},{"path":37,"query":2473},{},{},1755160916265,1748505597009,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe0bc03adbea446cb9eabf73b3dd364c3",[],{"createdDate":2480,"id":2481,"name":2482,"modelId":235,"published":13,"meta":2483,"query":2486,"data":2489,"variations":2598,"lastUpdated":2599,"firstPublished":2600,"testRatio":33,"screenshot":2601,"createdBy":34,"lastUpdatedBy":72,"folders":2602,"rev":408},1747389981686,"292c1ef738444c2787ffc64baccfd05d","Risky Business Soapbox 05/16",{"lastPreviewUrl":2484,"kind":228,"hasLinks":6,"originalContentId":2358,"breakpoints":2485,"winningTest":118},"https://pushsecurity.com/resources/riskybusiness0516?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=292c1ef738444c2787ffc64baccfd05d&builder.overrides.292c1ef738444c2787ffc64baccfd05d=292c1ef738444c2787ffc64baccfd05d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},[2487],{"@type":162,"property":163,"operator":164,"value":2488},"/resources/riskybusiness0516",{"seoTitle":2490,"seoDescription":2490,"description":2490,"themeId":6,"title":2490,"type":1001,"coverImage":2491,"blocks":2492,"url":2488,"state":2595},"Risky Biz Soap Box: Push Security's browser-first twist on identity security","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa37b16b56de34c6abbad688c4d141899",[2493,2573,2582,2590],{"@type":106,"@version":107,"id":2494,"meta":2495,"component":2496,"responsiveStyles":2570},"builder-e504c3e48c7843c8b77b9141f1fea191",{"previousId":2389},{"name":250,"options":2497},{"columns":2498,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2499,2545],{"blocks":2500,"width":311},[2501,2510,2520],{"@type":106,"@version":107,"id":2502,"meta":2503,"component":2504,"responsiveStyles":2507},"builder-96c480796781497ab6bfe3e3975b5d3b",{"previousId":258},{"name":260,"tag":260,"options":2505},{"title":2506,"isCentered":6},"\u003Cp>Push Security's browser-first twist on identity security\u003C/p>",{"large":2508,"small":2509},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":2511,"component":2512,"responsiveStyles":2518},"builder-a0bc74b5ca594000aaae5e11082852e3",{"name":301,"options":2513},{"options":2514},[2515],{"optionTitle":2516,"description":2517},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Risky Business Soapbox\u003C/span>\u003C/p>","\u003Cp>Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Push has built an identity security platform that collects identity information and events from your users' browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/personal account that a user has spun up.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>It's extremely difficult to bypass. That's because when you're in the browser it doesn't matter how a phishing link arrives, or how a threat actor has concealed it from your detection stack — if the user sees it, Push sees it.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>There are solutions for protecting your users SSO credentials, like passkeys. But what about all the SaaS in your environment? Even if it's enrolled into your SSO, are you sure that's how your users are authenticating to it? What about the automation platforms your developers and admins use? What about data platforms like Snowflake? Are your using setting up passkeys for those accounts? How would you know, and what problems can it cause if those accounts are vulnerable?\u003C/p>",{"large":2519},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":2521,"component":2522,"responsiveStyles":2542},"builder-0e0f791dafe94f499869f969fc2fea87",{"name":317,"options":2523},{"hosts":2524},[2525,2533],{"host":2526},{"@type":17,"id":2020,"model":190,"value":2527},{"lastUpdatedBy":34,"folders":2528,"data":2529,"modelId":194,"query":2530,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":2531,"variations":2532,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"host":2534},{"@type":17,"id":788,"model":190,"value":2535},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":2536,"data":2537,"variations":2538,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":2539,"meta":2540,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":2541,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":2543,"small":2544},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":2546,"width":357},[2547,2555,2563],{"@type":106,"@version":107,"id":2548,"meta":2549,"component":2550,"responsiveStyles":2553},"builder-1afcb344064f422680c7da47095a7bc2",{"previousId":290},{"name":292,"options":2551},{"videoId":2552},"yyq8kcWpRRU",{"large":2554},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2556,"meta":2557,"component":2558,"responsiveStyles":2561},"builder-b212ec5732a64770a9f5bbb177c46007",{"previousId":338},{"name":340,"options":2559},{"text":2560},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for Adam, Luke and the team?\u003C/span>\u003C/p>",{"large":2562},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2564,"meta":2565,"component":2566,"responsiveStyles":2568},"builder-870120533a8840bebb9ba4e722ff1a52",{"previousId":349},{"name":351,"tag":351,"options":2567},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2569},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2571,"small":2572},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2574,"meta":2575,"component":2576,"responsiveStyles":2579},"builder-ac517b29031f4e5dbd0c0455163a0b92",{"previousId":2451},{"name":366,"tag":366,"options":2577},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2578},[],{"large":2580,"small":2581},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2583,"meta":2584,"component":2585,"responsiveStyles":2587},"builder-279cd5aac1e147148e3132e2c8df1259",{"previousId":2460},{"name":378,"options":2586},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":2588,"small":2589},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2591,"@type":106,"tagName":131,"properties":2592,"responsiveStyles":2593},"builder-pixel-gc4302p9a96",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2594},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2596},{"path":37,"query":2597},{},{},1747390384683,1747390384654,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4c353ccd4374487ab1d95bd38cb16376",[],{"createdDate":2604,"id":2358,"name":2605,"modelId":235,"published":13,"meta":2606,"query":2610,"data":2613,"variations":2726,"lastUpdated":2727,"firstPublished":2728,"testRatio":33,"screenshot":2729,"createdBy":34,"lastUpdatedBy":72,"folders":2730,"rev":408},1745489150194,"On-demand webinar: It's 2025 — Why Haven't We Solved Phishing Yet?!",{"hasLinks":6,"kind":228,"originalContentId":2607,"lastPreviewUrl":2608,"breakpoints":2609,"winningTest":118},"be4b2de800084f6791b88d525a66a752","https://pushsecurity.com/resources/phishing-2025?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=1b431ce89d4f41b88a1823cba99b1fd1&builder.overrides.1b431ce89d4f41b88a1823cba99b1fd1=1b431ce89d4f41b88a1823cba99b1fd1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},[2611],{"@type":162,"property":163,"operator":164,"value":2612},"/resources/phishing-2025",{"seoTitle":2614,"description":2615,"type":243,"themeId":6,"ogImage":2616,"seoDescription":2615,"coverImage":2617,"title":2614,"blocks":2618,"url":2612,"state":2723},"On-demand Webinar: It's 2025 — Why Haven't We Solved Phishing Yet?!","Why phishing attacks are still an unsolved problem in 2025.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2140c40da40e4e55833235df8000b33f","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd671c1411d084e78aa93db9d61399154",[2619,2639,2701,2710,2718],{"@type":106,"@version":107,"id":2389,"meta":2620,"component":2622,"responsiveStyles":2636},{"previousId":2621},"builder-a5fdc7d5bc13480e88bf271a5d8b3a65",{"name":250,"options":2623},{"columns":2624,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2625],{"blocks":2626},[2627],{"@type":106,"@version":107,"id":2628,"meta":2629,"component":2630,"responsiveStyles":2633},"builder-b0b7d5e8194a4334aaf74069e8dc0d08",{"previousId":258},{"name":260,"tag":260,"options":2631},{"title":2632,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">It's 2025\u003C/span> — why haven't we solved phishing yet?!\u003C/p>",{"large":2634,"small":2635},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"large":2637,"small":2638},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2640,"meta":2641,"component":2642,"responsiveStyles":2698},"builder-74781f6adf52458bbafceab3b42b404d",{"previousId":2389},{"name":250,"options":2643},{"columns":2644,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2645,2665],{"blocks":2646,"width":311},[2647,2655],{"@type":106,"@version":107,"id":2648,"meta":2649,"component":2650,"responsiveStyles":2653},"builder-8679cb4cb51b4dd98a5746047aae9443",{"previousId":290},{"name":292,"options":2651},{"videoId":2652},"zmo_tPbCXtA",{"large":2654},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2656,"component":2657,"responsiveStyles":2663},"builder-78fb2443c83642e7a8881f99fe27b316",{"name":301,"options":2658},{"options":2659},[2660],{"optionTitle":2661,"description":2662},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Phishing in 2025\u003C/span>\u003C/p>","\u003Cp>Today's sophisticated phishing attacks are routinely bypassing multiple layers of defense across email, network, and endpoint security solutions.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Identity controls like MFA and SSO aren’t cutting it either, with MFA-bypassing phish kits now the new normal.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Join Luke Jennings, VP R&amp;D, as he breaks down:\u003C/p>\u003Cul>\u003Cli>Why phishing attacks are more attractive than ever for attackers in 2025.\u003C/li>\u003Cli>How control groups are failing across identity security and phishing prevention.\u003C/li>\u003Cli>What we need to tackle the problem (hint: it’s not more awareness training).\u003C/li>\u003C/ul>",{"large":2664},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127,"paddingTop":310},{"blocks":2666,"width":357},[2667,2684,2691],{"@type":106,"@version":107,"id":2668,"component":2669,"responsiveStyles":2681},"builder-5777b20d3bd94cceb21daa02b67a7024",{"name":317,"options":2670},{"hosts":2671},[2672],{"host":2673},{"@type":17,"id":788,"model":190,"value":2674},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":2675,"data":2676,"variations":2677,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":2678,"meta":2679,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":2680,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":2682,"small":2683},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":333,"marginTop":310},{"display":140},{"@type":106,"@version":107,"id":2685,"meta":2686,"component":2687,"responsiveStyles":2689},"builder-46218e256cf84251bc34395fcd6c2677",{"previousId":338},{"name":340,"options":2688},{"text":813},{"large":2690},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2692,"meta":2693,"component":2694,"responsiveStyles":2696},"builder-490256fae1ba45fab0ddf4a9bbee66a8",{"previousId":349},{"name":351,"tag":351,"options":2695},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2697},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2699,"small":2700},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2451,"meta":2702,"component":2704,"responsiveStyles":2707},{"previousId":2703},"builder-f7fa6da82d614584aa9509276fe2c3a9",{"name":366,"tag":366,"options":2705},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2706},[],{"large":2708,"small":2709},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2460,"meta":2711,"component":2713,"responsiveStyles":2715},{"previousId":2712},"builder-1aeb0b102a7a4631b241b9a624dc82aa",{"name":378,"options":2714},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":2716,"small":2717},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2719,"@type":106,"tagName":131,"properties":2720,"responsiveStyles":2721},"builder-pixel-jizw301exl",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2722},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2724},{"path":37,"query":2725},{},{},1748596813216,1745489553852,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F28bce612cb614b2db68aa143b9a1ed6b",[],{"folders":2732,"createdDate":2733,"id":2607,"name":2734,"modelId":235,"published":13,"meta":2735,"query":2739,"data":2742,"variations":2846,"lastUpdated":2847,"firstPublished":2848,"testRatio":33,"screenshot":2849,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1740750330340,"On-demand webinar: Automating Identity Attacks",{"originalContentId":2736,"lastPreviewUrl":2737,"hasLinks":6,"winningTest":118,"breakpoints":2738,"kind":228},"240a4f87fae74a1b8d0e767969f86e32","https://app.dev.pushsecurity.com/resources/automating-identity-attacks?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=be4b2de800084f6791b88d525a66a752&builder.overrides.be4b2de800084f6791b88d525a66a752=be4b2de800084f6791b88d525a66a752",{"small":39,"medium":40},[2740],{"@type":162,"property":163,"operator":164,"value":2741},"/resources/automating-identity-attacks",{"title":2743,"ogImage":2744,"seoDescription":2745,"coverImage":2746,"description":2745,"type":243,"themeId":6,"seoTitle":2747,"blocks":2748,"url":2741,"state":2843},"On-demand webinar: Automating identity attacks","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb804efdd850f4f86a5f582021d106891","Using CUAs like OpenAI Operator to automate identity attacks.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F13b7c3b6ec3c47f1b39bdc5ce78e141c","On-demand webinar: Attack automation with Computer-Using Agents",[2749,2820,2829,2838],{"@type":106,"@version":107,"id":2621,"meta":2750,"component":2752,"responsiveStyles":2817},{"previousId":2751},"builder-7ac63c7838034ed0af52e844bfe4edd5",{"name":250,"options":2753},{"columns":2754,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2755,2793],{"blocks":2756,"width":311},[2757,2766,2776],{"@type":106,"@version":107,"id":2758,"meta":2759,"component":2760,"responsiveStyles":2763},"builder-bf962cb50201483ab718c42ae5135a18",{"previousId":258},{"name":260,"tag":260,"options":2761},{"title":2762,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">5 ways\u003C/span> Computer-Using Agents can automate identity attacks\u003C/p>",{"large":2764,"small":2765},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":2767,"component":2768,"responsiveStyles":2774},"builder-474ba9af0ccd45a6891adcdbc7b4d01f",{"name":301,"options":2769},{"options":2770},[2771],{"optionTitle":2772,"description":2773},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Automating identity attacks\u003C/span>\u003C/p>","\u003Cp>CUAs are a new kind of AI agent that drives your browser/OS/ for you. These tools are essentially no-code automation platforms, enabling low-cost, low-effort automation of common web tasks — including those frequently exploited by attackers.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Join our VP R&amp;D, Luke Jennings, to learn how attackers can use CUAs for:\u003C/p>\u003Cul>\u003Cli>Reconnaissance to discover SaaS tenants and login methods\u003C/li>\u003Cli>Initial access through scaling up credential attacks\u003C/li>\u003Cli>Persistence following account takeover by creating ghost logins\u003C/li>\u003Cli>Lateral movement to compromise additional apps and accounts\u003C/li>\u003Cli>Exfiltration through data collection across apps and accounts\u003C/li>\u003C/ul>",{"large":2775},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":2777,"component":2778,"responsiveStyles":2790},"builder-e4dbc6930eac46299467c23964bada81",{"name":317,"options":2779},{"hosts":2780},[2781],{"host":2782},{"@type":17,"id":788,"model":190,"value":2783},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":2784,"data":2785,"variations":2786,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":2787,"meta":2788,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":2789,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":2791,"small":2792},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":2794,"width":357},[2795,2803,2810],{"@type":106,"@version":107,"id":2796,"meta":2797,"component":2798,"responsiveStyles":2801},"builder-e3f89b2117fc4cc5bcf7f66fd1b410df",{"previousId":290},{"name":292,"options":2799},{"videoId":2800},"BuefsnMMyrM",{"large":2802},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":2804,"meta":2805,"component":2806,"responsiveStyles":2808},"builder-14c5cc22fd9f46fea50ea5cd557f37c9",{"previousId":338},{"name":340,"options":2807},{"text":813},{"large":2809},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":2811,"meta":2812,"component":2813,"responsiveStyles":2815},"builder-78c378c351dc446fb8ddace53607017a",{"previousId":349},{"name":351,"tag":351,"options":2814},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":2816},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":2818,"small":2819},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2703,"meta":2821,"component":2823,"responsiveStyles":2826},{"previousId":2822},"builder-be78e3541feb45cb8fdde0b915d7bc25",{"name":366,"tag":366,"options":2824},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2825},[],{"large":2827,"small":2828},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2712,"meta":2830,"component":2832,"responsiveStyles":2835},{"previousId":2831},"builder-c94026f438b94b5f8aaf04073b0ff2a0",{"name":378,"options":2833},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},"(max-width: 638px) 95vw, (max-width: 998px) 97vw, 120vw",{"large":2836,"small":2837},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2839,"@type":106,"tagName":131,"properties":2840,"responsiveStyles":2841},"builder-pixel-3ob5dnzxaot",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2842},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2844},{"path":37,"query":2845},{},{},1742474207351,1740750976982,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcf1e7beb2a7b4655a3a5d0fe28f94a23",{"folders":2851,"createdDate":2852,"id":2853,"name":2854,"modelId":235,"published":13,"meta":2855,"query":2859,"data":2862,"variations":2959,"lastUpdated":2960,"firstPublished":2961,"testRatio":33,"screenshot":2962,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744208588789,"20bda4f26b7e4fb2aeeb03863885270c","Hacked podcast",{"hasLinks":6,"breakpoints":2856,"winningTest":118,"kind":228,"lastPreviewUrl":2857,"originalContentId":2858},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/hacked-022125?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=20bda4f26b7e4fb2aeeb03863885270c&builder.overrides.20bda4f26b7e4fb2aeeb03863885270c=20bda4f26b7e4fb2aeeb03863885270c&builder.options.includeRefs=true&builder.options.enrich=true","843a52fc8dd7470d8f7279df703c71a0",[2860],{"@type":162,"property":163,"operator":164,"value":2861},"/resources/hacked-022125",{"type":1001,"seoDescription":2863,"coverImage":2864,"themeId":6,"seoTitle":2865,"description":2863,"title":2865,"blocks":2866,"url":2861,"state":2956},"Adam used to break into companies for a living—legally. As a red teamer, he watched the attack surface shift from networks to endpoints to something new: identity. The Snowflake breach proved it—attackers aren’t breaking in anymore, they’re logging in.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3970d61051c84d1898a2cce7d64dbae1","Adam Bateman appears on Hacked Podcast",[2867,2932,2942,2951],{"@type":106,"@version":107,"id":2868,"meta":2869,"component":2871,"responsiveStyles":2929},"builder-3e9b661643f74b8996ec719730752f3b",{"previousId":2870},"builder-0f04d6df2c7e432398a9452f331c96ba",{"name":250,"options":2872},{"columns":2873,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2874,2911],{"blocks":2875,"width":311},[2876,2885,2895],{"@type":106,"@version":107,"id":2877,"meta":2878,"component":2879,"responsiveStyles":2882},"builder-7096e986a74b42859430a7c5cb6abf10",{"previousId":258},{"name":260,"tag":260,"options":2880},{"title":2881,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Hacked:\u003C/span>\u003C/p>\u003Ch2>The Red Teamer\u003C/h2>",{"large":2883,"small":2884},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":2886,"component":2887,"responsiveStyles":2893},"builder-32b9abb59b2942d6ac67b8692570f6d0",{"name":301,"options":2888},{"options":2889},[2890],{"optionTitle":2891,"description":2892},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Hacked: The Red Teamer\u003C/span>\u003C/p>","\u003Cp>Adam used to break into companies for a living—legally. As a red teamer, he watched the attack surface shift from networks to endpoints to something new: identity. The Snowflake breach proved it—attackers aren’t breaking in anymore, they’re logging in. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Adam saw it coming, founded Push Security to stop it, and now he’s here to break it all down. They’re our new sponsor, so if that’s not your thing, no worries—catch you in the next one. But his story? Fascinating.\u003C/p>",{"large":2894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":2896,"component":2897,"responsiveStyles":2908},"builder-0de075e0f47a439fa63e5c82eccec1be",{"name":317,"options":2898},{"hosts":2899},[2900],{"host":2901},{"@type":17,"id":2020,"model":190,"value":2902},{"lastUpdatedBy":34,"folders":2903,"data":2904,"modelId":194,"query":2905,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":2906,"variations":2907,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":2909,"small":2910},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":2912,"width":357},[2913,2920],{"@type":106,"@version":107,"id":2914,"component":2915,"responsiveStyles":2918},"builder-ed465371f95d456daf3ee248373319f5",{"name":378,"options":2916},{"image":2917,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":39,"width":39},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7bd2fd31825a487ea30b731b6354f50f",{"large":2919},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":2921,"meta":2922,"component":2923,"responsiveStyles":2927},"builder-7f46b681af1c4ce6b47dae1316938bca",{"previousId":349},{"name":351,"tag":351,"options":2924},{"align":267,"size":142,"text":2925,"redirect":2926,"redirectOpenInNewTab":41},"Listen Here","https://open.spotify.com/episode/51XJv9UDNoOBRu0ehyLSiY?si=f4f6530536184738&nd=1&dlsi=e05aa0af105b4ef4",{"large":2928},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":2930,"small":2931},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2933,"meta":2934,"component":2936,"responsiveStyles":2939},"builder-73a6e655cbcc4eee8ae5020745f242ef",{"previousId":2935},"builder-385fb76dfc0743e7afe23df533e8c04e",{"name":366,"tag":366,"options":2937},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":2938},[],{"large":2940,"small":2941},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2943,"meta":2944,"component":2946,"responsiveStyles":2948},"builder-3b01a9abeea84a8a918811f6f4ecb270",{"previousId":2945},"builder-60e6ab3943ca433b9d267e63af51f98d",{"name":378,"options":2947},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":2949,"small":2950},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":2952,"@type":106,"tagName":131,"properties":2953,"responsiveStyles":2954},"builder-pixel-yqyi1j4h6b",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":2955},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":2957},{"path":37,"query":2958},{},{},1744208942546,1744208942513,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb582a207a8794082aad91673f50f6d39",{"createdDate":2964,"id":2349,"name":2965,"modelId":235,"published":13,"query":2966,"data":2969,"variations":3054,"lastUpdated":3055,"firstPublished":3056,"testRatio":33,"screenshot":3057,"createdBy":53,"lastUpdatedBy":72,"folders":3058,"meta":3059,"rev":408},1737027963386,"2024 Identity Attacks book",[2967],{"@type":162,"property":163,"operator":164,"value":2968},"/resources/2024-identity-attacks",{"seoDescription":2970,"ogImage":2971,"themeId":6,"title":2972,"seoTitle":2972,"description":2970,"coverImage":2973,"type":420,"blocks":2974,"url":2968,"state":3051},"Looking back on identity attacks in 2024 and the evolution of attacker tooling and techniques.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F43e5a99299c94aa795f990201302c345","2024: A Year of Identity Attacks","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fab9ce9cdf91e4d65ac65ce3857f04df4",[2975,3046],{"@type":106,"@version":107,"id":2243,"meta":2976,"component":2978,"responsiveStyles":3044},{"previousId":2977},"builder-aed1ef8be5b24e5a90e9da951cfd6875",{"name":250,"options":2979,"isRSC":118},{"columns":2980,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2981],{"blocks":2982},[2983,3028,3036],{"@type":106,"@version":107,"id":2984,"component":2985,"responsiveStyles":3026},"builder-31735215afbe466398f64e69280da3e3",{"name":250,"options":2986,"isRSC":118},{"columns":2987,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[2988,3016],{"blocks":2989},[2990,2997,3004],{"@type":106,"@version":107,"layerName":260,"id":2991,"component":2992,"responsiveStyles":2995},"builder-e4329f6a150f4736846e6dadb7915033",{"name":260,"tag":260,"options":2993,"isRSC":118},{"title":2994},"\u003Cp>2024: \u003Cspan style=\"color: rgb(255, 72, 37);\">A year of identity attacks\u003C/span>\u003C/p>",{"large":2996},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":2998,"component":2999,"responsiveStyles":3002},"builder-0199f81fa4fa47bc92d2f0a505c1192d",{"name":533,"tag":533,"options":3000,"isRSC":118},{"description":3001},"\u003Cp>Identity attacks where attackers look to take over accounts on internet-facing apps and services are by far the most common attack experienced by organizations today. But the events of 2024 show that they’re now also the most impactful.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 178, 44);\">Read our analysis of the most impactful identity breaches of 2024, and the lasting effect on attacker tooling and techniques that we can expect in 2025.\u003C/strong>\u003C/p>",{"large":3003},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":3005,"meta":3006,"component":3008,"responsiveStyles":3014},"builder-9a431ff4f0114751a8ff496e4d7e5c1c",{"previousId":3007},"builder-382d7c18c31f4e05ac6355f3e06d18f6",{"name":378,"options":3009,"isRSC":118},{"image":3010,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":3011,"lockAspectRatio":6,"height":3012,"width":3013},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5089cc9d6b424fa2b609548128abde22",0.772,1500,1944,{"large":3015},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"blocks":3017},[3018],{"@type":106,"@version":107,"id":3019,"component":3020,"responsiveStyles":3024},"builder-9f0d72ef66c8494d88558e0c4e28b578",{"name":547,"tag":547,"options":3021,"isRSC":118},{"chiliPiper":6,"prodFormId":3022,"formTitle":37,"segmentId":1340,"segmentFriendlyName":87,"downloadFile":3023,"subscribeForEmail":41},"7abcce55-4cee-4d96-8436-a6c3ff09b602","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F37c40342505441e4a27b71cd8beb5b58?alt=media&token=d6f8e7e3-a8a2-42fb-a494-f1438453fb98&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":3025},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"large":3027},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":3029,"meta":3030,"component":3031,"responsiveStyles":3033},"builder-d3423341b3764c53b85ad17fd8cb992b",{"previousId":558},{"name":366,"tag":366,"options":3032,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":3034,"small":3035},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310,"paddingTop":297,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":3037,"meta":3038,"component":3039,"responsiveStyles":3042},"builder-586f5ee2cde1440aa05e5e8d9a8ad434",{"previousId":567},{"name":378,"options":3040,"isRSC":118},{"image":3041,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a",{"large":3043},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":3045},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":268},{"id":3047,"@type":106,"tagName":131,"properties":3048,"responsiveStyles":3049},"builder-pixel-wwfyxsgxte",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3050},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3052},{"path":37,"query":3053},{},{},1761743438876,1737046951056,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdfee05214c7141a0893894b1f7768856",[],{"kind":228,"winningTest":118,"originalContentId":3060,"lastPreviewUrl":3061,"breakpoints":3062,"hasLinks":6,"hasAutosaves":41},"7f3db2852bf84fed8e0e8659ba857d6c","https://pushsecurity.com/resources/2024-identity-attacks?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=71c2375c0b254c80b7afaf50aa23bbf8&builder.overrides.71c2375c0b254c80b7afaf50aa23bbf8=71c2375c0b254c80b7afaf50aa23bbf8&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"folders":3064,"createdDate":3065,"id":3066,"name":3067,"modelId":235,"published":13,"meta":3068,"query":3072,"data":3075,"variations":3179,"lastUpdated":3180,"firstPublished":3181,"testRatio":33,"screenshot":3182,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744207867073,"81f7a999207a4509989b11c6fa8b65de","Risky business 777",{"kind":228,"breakpoints":3069,"hasLinks":6,"winningTest":118,"lastPreviewUrl":3070,"originalContentId":3071},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/riskybusiness-012925?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=81f7a999207a4509989b11c6fa8b65de&builder.overrides.81f7a999207a4509989b11c6fa8b65de=81f7a999207a4509989b11c6fa8b65de&builder.options.includeRefs=true&builder.options.enrich=true","7324e2c7047746e1aab0c4d5c6419537",[3073],{"@type":162,"property":163,"operator":164,"value":3074},"/resources/riskybusiness-012925",{"title":3076,"seoDescription":3077,"seoTitle":3076,"coverImage":3078,"themeId":6,"description":3077,"type":1001,"blocks":3079,"url":3074,"state":3176},"Risky Business #777 w/ Luke Jennings","Luke Jennings joins to discuss some of the pitfalls of federated authentication, like attackers using unexpected identity providers to log in to your apps. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb73d7f7525e545429a8c7f31951278e8",[3080,3152,3162,3171],{"@type":106,"@version":107,"id":3081,"meta":3082,"component":3084,"responsiveStyles":3149},"builder-2358ddee9e2b4a508813b19af361c0e3",{"previousId":3083},"builder-d4e1f8e9e528482bbc6a821fbcf49927",{"name":250,"options":3085},{"columns":3086,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3087,3125],{"blocks":3088,"width":311},[3089,3098,3108],{"@type":106,"@version":107,"id":3090,"meta":3091,"component":3092,"responsiveStyles":3095},"builder-c622361197ae41cab29a31ca6e956c40",{"previousId":258},{"name":260,"tag":260,"options":3093},{"title":3094,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business:\u003C/span>\u003C/p>\u003Cp>Cross-IdP Impersonation &amp; Verification Phishing\u003C/p>",{"large":3096,"small":3097},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3099,"component":3100,"responsiveStyles":3106},"builder-899276b0cd264dae8488951d1dab85e4",{"name":301,"options":3101},{"options":3102},[3103],{"optionTitle":3104,"description":3105},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Risky Business\u003C/span>\u003C/p>","\u003Cp>Luke Jennings joins to discuss some of the pitfalls of federated authentication, like attackers using unexpected identity providers to log in to your apps. \u003C/p>",{"large":3107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3109,"component":3110,"responsiveStyles":3122},"builder-e8cda153d7bd4aef896a30c38baf2157",{"name":317,"options":3111},{"hosts":3112},[3113],{"host":3114},{"@type":17,"id":788,"model":190,"value":3115},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":3116,"data":3117,"variations":3118,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":3119,"meta":3120,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":3121,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":3123,"small":3124},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3126,"width":357},[3127,3135,3142],{"@type":106,"@version":107,"id":3128,"meta":3129,"component":3130,"responsiveStyles":3133},"builder-5b7e3885dd934ba38f3c008c6ecb021d",{"previousId":290},{"name":292,"options":3131},{"videoId":3132},"AsjcZAqdNYw",{"large":3134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3136,"meta":3137,"component":3138,"responsiveStyles":3140},"builder-941a35698d4e4e90b118fe502d3b06b5",{"previousId":338},{"name":340,"options":3139},{"text":813},{"large":3141},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3143,"meta":3144,"component":3145,"responsiveStyles":3147},"builder-d20c7db2079b46a79354cccaf0560ec8",{"previousId":349},{"name":351,"tag":351,"options":3146},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3148},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3150,"small":3151},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3153,"meta":3154,"component":3156,"responsiveStyles":3159},"builder-83decd3f1cc942388398a7167dd34ba6",{"previousId":3155},"builder-cba6725ca51747c485fee3d5177ac6ff",{"name":366,"tag":366,"options":3157},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3158},[],{"large":3160,"small":3161},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3163,"meta":3164,"component":3166,"responsiveStyles":3168},"builder-b6dc68dd35f0487195e75993bd6db457",{"previousId":3165},"builder-a015800c58aa484aba8fc6b751bde818",{"name":378,"options":3167},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3169,"small":3170},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3172,"@type":106,"tagName":131,"properties":3173,"responsiveStyles":3174},"builder-pixel-s8i70sou1eo",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3175},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3177},{"path":37,"query":3178},{},{},1744208020057,1744208020025,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc7b35433a28645e6941427cb95a07cb3",{"folders":3184,"createdDate":3185,"id":3186,"name":3187,"modelId":235,"published":13,"meta":3188,"query":3192,"data":3195,"variations":3283,"lastUpdated":3284,"firstPublished":3285,"testRatio":33,"screenshot":3286,"createdBy":53,"lastUpdatedBy":72,"rev":408},[],1737024351628,"dafe93d41a8742dd832b6f028937160a","Kuppinger-Cole Report",{"originalContentId":3189,"kind":228,"lastPreviewUrl":3190,"breakpoints":3191,"hasLinks":6,"winningTest":118},"039b71cbdf9b418da5bc116c467676fe","https://app.dev.pushsecurity.com/resources/kuppingercole-report?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=dafe93d41a8742dd832b6f028937160a&builder.overrides.dafe93d41a8742dd832b6f028937160a=dafe93d41a8742dd832b6f028937160a&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[3193],{"@type":162,"property":163,"operator":164,"value":3194},"/resources/kuppingercole-report",{"ogImage":3196,"seoTitle":3197,"description":3198,"coverImage":3199,"seoDescription":3198,"type":420,"themeId":6,"title":3200,"blocks":3201,"url":3194,"state":3280},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F355d982fe981482aa3457698c0cb78ea","Push Security named Rising Star for ITDR","Read the KuppingerCole 2024 “Rising Star: Push Security” report to find out why Push Security has been named a rising star in the emerging Identity Threat Detection and Response (ITDR) category.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcf91049aced647ada1de643328fb3fb2","Push Security named Rising Star for ITDR by KuppingerCole",[3202,3275],{"@type":106,"@version":107,"id":3203,"meta":3204,"component":3206,"responsiveStyles":3273},"builder-73d0f4128c3f48b888dcc0e5ba7d41b6",{"previousId":3205},"builder-6d23915e9e624eb2944409b3596d49fc",{"name":250,"options":3207},{"columns":3208,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3209],{"blocks":3210},[3211,3259,3266],{"@type":106,"@version":107,"layerName":250,"id":3212,"component":3213,"responsiveStyles":3257},"builder-7f4b96c99d024c53bfd63b7d4c36858f",{"name":250,"options":3214},{"columns":3215,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3216,3243],{"blocks":3217},[3218,3227,3236],{"@type":106,"@version":107,"layerName":260,"id":3219,"meta":3220,"component":3222,"responsiveStyles":3225},"builder-2ec88c731b32469b897365ee22223136",{"previousId":3221},"builder-7c92392235ec4a52b8fe2196d64d6404",{"name":260,"tag":260,"options":3223},{"title":3224,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(255, 72, 36);\">Push Security\u003C/span>\u003C/p>\u003Cp>Named Rising Star for ITDR by KuppingerCole\u003C/p>",{"large":3226},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":533,"id":3228,"meta":3229,"component":3231,"responsiveStyles":3234},"builder-2055c690d93b4e2aa68d00257c5170cd",{"previousId":3230},"builder-7112bee56c55495692d794b3e095dab6",{"name":533,"tag":533,"options":3232},{"description":3233},"\u003Cp>Read the KuppingerCole 2024 “Rising Star: Push Security” report to find out why Push Security has been named a rising star in the emerging Identity Threat Detection and Response (ITDR) category.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>The report highlights Push's ability to enhance identity security using its unique browser-based approach and seamless integration with XDR, SIEM and SOAR platforms.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>The report provides an analyst's perspective on the ITDR market's growth and Push Security's role in shaping its future:\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 178, 44);\">“Push Security demonstrates a strong product/market fit by addressing the surge in identity-based attacks, the most common vector for breaches. Organizations increasingly recognize the need for specialized ITDR tools, positioning Push Security as a critical component of modern cybersecurity strategies.”\u003C/strong>\u003C/p>",{"large":3235},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":124,"marginBottom":266},{"@type":106,"@version":107,"id":3237,"component":3238,"responsiveStyles":3241},"builder-879ff07bd3e94de88d5085b8cc73db7f",{"name":351,"tag":351,"options":3239},{"text":87,"align":267,"size":142,"download":3240},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e59da1aa04f4714913b21252880a434?alt=media&token=690600c2-f71a-4b63-98f5-01f59e38cefc&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":3242},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1798,"paddingBottom":1798},{"blocks":3244},[3245],{"@type":106,"@version":107,"layerName":378,"id":3246,"meta":3247,"component":3249,"responsiveStyles":3254},"builder-a98b63aa260c4c50b8e5a5ccae3663da",{"previousId":3248},"builder-e1186ebcc515495299bb65f38c7b3006",{"name":378,"options":3250},{"image":3251,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":3252,"lockAspectRatio":6,"height":3012,"width":3253},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdb856e244df141c0aa666b1d5680beaa",1.078,1392,{"large":3255},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":3256,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},"60%",{"large":3258},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":274},{"@type":106,"@version":107,"id":3260,"component":3261,"responsiveStyles":3263},"builder-e929e6c292324e59b270abb0340a1316",{"name":366,"tag":366,"options":3262},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":3264,"small":3265},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"paddingTop":265},{"display":140},{"@type":106,"@version":107,"id":3267,"meta":3268,"component":3269,"responsiveStyles":3271},"builder-616b502cdb32431891837bd6a15916f4",{"previousId":567},{"name":378,"options":3270},{"image":3041,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384},{"large":3272},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":3274},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":3276,"@type":106,"tagName":131,"properties":3277,"responsiveStyles":3278},"builder-pixel-vzun1n48i79",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3279},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3281},{"path":37,"query":3282},{},{},1744192251378,1737538409101,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6f7fa46b5c284736ab512e822a430913",{"folders":3288,"createdDate":3289,"id":3290,"name":3291,"modelId":235,"published":13,"meta":3292,"query":3296,"data":3299,"variations":3399,"lastUpdated":3400,"firstPublished":3401,"testRatio":33,"screenshot":3402,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737027953725,"d4347fef53374873a163eb4845661f42","On-demand webinar: Phish kit teardown",{"kind":228,"originalContentId":3293,"breakpoints":3294,"hasLinks":6,"lastPreviewUrl":3295,"winningTest":118},"54a9543ebcab411b8a7b3d24406feda5",{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/on-demand-webinar-phish-kit-teardown?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=d4347fef53374873a163eb4845661f42&builder.overrides.d4347fef53374873a163eb4845661f42=d4347fef53374873a163eb4845661f42",[3297],{"@type":162,"property":163,"operator":164,"value":3298},"/resources/on-demand-webinar-phish-kit-teardown",{"description":3300,"themeId":6,"coverImage":3301,"type":243,"title":3291,"seoTitle":3291,"seoDescription":3300,"blocks":3302,"url":3298,"state":3396},"Luke Jennings, VP R&D at Push Security, tears down popular AitM phishing kits to see what makes them so effective at getting through your defenses.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F03f92c2858694437b260be89e4ca8328",[3303,3374,3383,3391],{"@type":106,"@version":107,"id":3304,"meta":3305,"component":3306,"responsiveStyles":3371},"builder-d93542870cc3488b8da8e27c3249b0ef",{"previousId":2621},{"name":250,"options":3307},{"columns":3308,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3309,3347],{"blocks":3310,"width":311},[3311,3320,3330],{"@type":106,"@version":107,"id":3312,"meta":3313,"component":3314,"responsiveStyles":3317},"builder-5ddb331a24324ced8ed9c557f87dd5d9",{"previousId":258},{"name":260,"tag":260,"options":3315},{"title":3316,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Phish kit teardown:\u003C/span> How phishing kits are getting through your detections\u003C/p>",{"large":3318,"small":3319},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3321,"component":3322,"responsiveStyles":3328},"builder-a70ac4c762ea495884241f36714d06a9",{"name":301,"options":3323},{"options":3324},[3325],{"optionTitle":3326,"description":3327},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Phish kit teardown\u003C/span>\u003C/p>","\u003Cp>Have you noticed an increase in phishing attacks finding a path through your detections? You aren’t the only one...\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cspan style=\"font-size: 18px;\">Luke Jennings, VP R&amp;D at Push Security, tears down popular AitM phishing kits to see what makes them so effective at getting through your defenses.&nbsp;\u003C/span>\u003Cstrong style=\"font-size: 18px;\">You’ll learn:\u003C/strong>\u003C/p>\u003Cul>\u003Cli>The common tricks that attackers and malware devs are using when building phishing kits\u003C/li>\u003Cli>Why established anti-phishing controls are failing to keep up with offensive innovations\u003C/li>\u003Cli>What security teams need to do to level the playing field against the influx of AitM phishing kits\u003C/li>\u003C/ul>",{"large":3329},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3331,"component":3332,"responsiveStyles":3344},"builder-edc305ee7b7844b199f8ae97e5a07268",{"name":317,"options":3333},{"hosts":3334},[3335],{"host":3336},{"@type":17,"id":788,"model":190,"value":3337},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":3338,"data":3339,"variations":3340,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":3341,"meta":3342,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":3343,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":3345,"small":3346},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3348,"width":357},[3349,3357,3364],{"@type":106,"@version":107,"id":3350,"meta":3351,"component":3352,"responsiveStyles":3355},"builder-5d310da73e6e4942b52bc1f9c68252ec",{"previousId":290},{"name":292,"options":3353},{"videoId":3354},"tZwSwoGO4c8",{"large":3356},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3358,"meta":3359,"component":3360,"responsiveStyles":3362},"builder-5fc5803dec69469d96a1509f31bcf005",{"previousId":338},{"name":340,"options":3361},{"text":813},{"large":3363},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3365,"meta":3366,"component":3367,"responsiveStyles":3369},"builder-dfe6110ca41444c28e51192165d40c28",{"previousId":349},{"name":351,"tag":351,"options":3368},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3370},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3372,"small":3373},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3375,"meta":3376,"component":3377,"responsiveStyles":3380},"builder-2de3227898e1442792cc372ffed5b697",{"previousId":2703},{"name":366,"tag":366,"options":3378},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3379},[],{"large":3381,"small":3382},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3384,"meta":3385,"component":3386,"responsiveStyles":3388},"builder-a644510d97ae40dc95f68a4c7cb223c4",{"previousId":2712},{"name":378,"options":3387},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3389,"small":3390},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3392,"@type":106,"tagName":131,"properties":3393,"responsiveStyles":3394},"builder-pixel-9llj99muyhr",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3395},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3397},{"path":37,"query":3398},{},{},1742400004677,1737104409907,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2b1c7b48c9064fff8f4ef438d6a72771",{"folders":3404,"createdDate":3405,"id":3406,"name":3407,"modelId":235,"published":13,"meta":3408,"query":3411,"data":3414,"variations":3513,"lastUpdated":3514,"firstPublished":3515,"testRatio":33,"screenshot":3516,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737046636174,"2258780ff1bc422ab72d347dd2dc7b4c","(The RSnake Show) Demo Day — Push Security",{"hasLinks":6,"kind":228,"breakpoints":3409,"originalContentId":3290,"lastPreviewUrl":3410,"winningTest":118},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/the-rsnake-show-demo-day-push-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=2258780ff1bc422ab72d347dd2dc7b4c&builder.overrides.2258780ff1bc422ab72d347dd2dc7b4c=2258780ff1bc422ab72d347dd2dc7b4c&builder.options.includeRefs=true&builder.options.enrich=true",[3412],{"@type":162,"property":163,"operator":164,"value":3413},"/resources/the-rsnake-show-demo-day-push-security",{"themeId":6,"type":1001,"seoDescription":3407,"coverImage":3415,"description":3416,"seoTitle":3407,"title":3407,"blocks":3417,"url":3413,"state":3510},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fec9b9795c9fe46b3bf32901e93ea3f26","Push CEO & co-founder Adam Bateman appeared on the RSnake show to discuss Push's browser-based ITDR product.",[3418,3488,3497,3505],{"@type":106,"@version":107,"id":3419,"meta":3420,"component":3421,"responsiveStyles":3485},"builder-fdcc9eb823b54daf9704e1fe8bb2e884",{"previousId":2621},{"name":250,"options":3422},{"columns":3423,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3424,3461],{"blocks":3425,"width":311},[3426,3435,3445],{"@type":106,"@version":107,"id":3427,"meta":3428,"component":3429,"responsiveStyles":3432},"builder-46b32a08fa3640bfac535d1c1e618b77",{"previousId":258},{"name":260,"tag":260,"options":3430},{"title":3431,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">The RSnake Show:\u003C/span> \u003C/p>\u003Cp>Demo Day — Push Security\u003C/p>",{"large":3433,"small":3434},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3436,"component":3437,"responsiveStyles":3443},"builder-2fcd944b8c834a28957db1b46c3fdd3e",{"name":301,"options":3438},{"options":3439},[3440],{"optionTitle":3441,"description":3442},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Demo Day: Push Security\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder Adam Bateman appeared on the RSnake show to discuss Push's browser-based ITDR product.\u003C/span>\u003C/p>",{"large":3444},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3446,"component":3447,"responsiveStyles":3458},"builder-2868da7ca3c84d3ea028c4fbd2529f4a",{"name":317,"options":3448},{"hosts":3449},[3450],{"host":3451},{"@type":17,"id":2020,"model":190,"value":3452},{"lastUpdatedBy":34,"folders":3453,"data":3454,"modelId":194,"query":3455,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":3456,"variations":3457,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":3459,"small":3460},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3462,"width":357},[3463,3471,3478],{"@type":106,"@version":107,"id":3464,"meta":3465,"component":3466,"responsiveStyles":3469},"builder-ba4e2646bb644203b0f3a13adff34c14",{"previousId":290},{"name":292,"options":3467},{"videoId":3468},"lQKvDz5ZgUA",{"large":3470},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3472,"meta":3473,"component":3474,"responsiveStyles":3476},"builder-70074f786a2c49ba96790e3d96f37c42",{"previousId":338},{"name":340,"options":3475},{"text":2044},{"large":3477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3479,"meta":3480,"component":3481,"responsiveStyles":3483},"builder-f9234a88c41c4a7d8711ef17df56fb49",{"previousId":349},{"name":351,"tag":351,"options":3482},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3486,"small":3487},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3489,"meta":3490,"component":3491,"responsiveStyles":3494},"builder-74b59e7151014603b21451a1726cc703",{"previousId":2703},{"name":366,"tag":366,"options":3492},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3493},[],{"large":3495,"small":3496},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3498,"meta":3499,"component":3500,"responsiveStyles":3502},"builder-eae4a3966f8d4f6dbd84b8c48673b288",{"previousId":2712},{"name":378,"options":3501},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3503,"small":3504},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3506,"@type":106,"tagName":131,"properties":3507,"responsiveStyles":3508},"builder-pixel-oo0r930i92r",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3509},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3511},{"path":37,"query":3512},{},{},1744193808289,1737104430525,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F21f0a33a4bca4294ac195dd60be0a0e2",{"folders":3518,"createdDate":3519,"id":2858,"name":3520,"modelId":235,"published":13,"meta":3521,"query":3525,"data":3528,"variations":3623,"lastUpdated":3624,"firstPublished":3625,"testRatio":33,"screenshot":3626,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744207522911,"Risky Business news interview - Jacques",{"hasLinks":6,"lastPreviewUrl":3522,"breakpoints":3523,"kind":228,"winningTest":118,"originalContentId":3524},"https://app.dev.pushsecurity.com/resources/riskybusiness-120224?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=843a52fc8dd7470d8f7279df703c71a0&builder.overrides.843a52fc8dd7470d8f7279df703c71a0=843a52fc8dd7470d8f7279df703c71a0&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},"e8d26de4d64a489cb5c87ec88b359e6b",[3526],{"@type":162,"property":163,"operator":164,"value":3527},"/resources/riskybusiness-120224",{"type":1001,"seoTitle":3529,"title":3529,"seoDescription":3530,"description":3530,"coverImage":3531,"themeId":6,"blocks":3532,"url":3527,"state":3620},"Jacques Louw appears on the Risky Business podcast","Jacques Louw, co-founder and chief product officer at Push Security, discusses the company’s new stolen credentials detection feature","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F947308b59037437e93cfcf945d1a6879",[3533,3598,3607,3615],{"@type":106,"@version":107,"id":2870,"meta":3534,"component":3536,"responsiveStyles":3595},{"previousId":3535},"builder-6a94a29b4ce74257bece432c5196500c",{"name":250,"options":3537},{"columns":3538,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3539,3577],{"blocks":3540,"width":311},[3541,3550,3560],{"@type":106,"@version":107,"id":3542,"meta":3543,"component":3544,"responsiveStyles":3547},"builder-49f245e0773a4cf19a38c67a2ec6ece5",{"previousId":258},{"name":260,"tag":260,"options":3545},{"title":3546,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business:\u003C/span>\u003C/p>\u003Ch2>Push Security on its new stolen credentials detection feature\u003C/h2>",{"large":3548,"small":3549},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3551,"component":3552,"responsiveStyles":3558},"builder-a8a729cc2a8d4ce4b033ddbd855184c7",{"name":301,"options":3553},{"options":3554},[3555],{"optionTitle":3556,"description":3557},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Risky Business Podcast\u003C/span>\u003C/p>","\u003Cp>In this Risky Business News sponsor interview, Catalin Cimpanu talks with Jacques Louw, co-founder and chief product officer at Push Security, on the company’s new stolen credentials detection feature, how AitM phishing can be spotted in the browser, and how Push deals with customers needing help with MFA.\u003C/p>",{"large":3559},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3561,"component":3562,"responsiveStyles":3574},"builder-46494352775f461c9b6ec67ef15dba26",{"name":317,"options":3563},{"hosts":3564},[3565],{"host":3566},{"@type":17,"id":1061,"model":190,"value":3567},{"createdDate":1063,"id":1061,"name":1064,"modelId":194,"published":13,"query":3568,"data":3569,"variations":3570,"lastUpdated":1072,"firstPublished":1073,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":3571,"meta":3572,"rev":1077},[],{"name":1067,"jobtitle":1068,"avatar":1069,"surname":1070},{},[],{"breakpoints":3573,"kind":36,"winningTest":118,"lastPreviewUrl":37,"originalContentId":788,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"large":3575,"small":3576},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3578,"width":357},[3579,3587],{"@type":106,"@version":107,"id":3580,"component":3581,"responsiveStyles":3585},"builder-e18d42ae6a874a9c8cd868029d90368d",{"name":378,"options":3582},{"image":3583,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":3584,"width":3584},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2842597f6dfa4a919235564e8fc610e9",300,{"large":3586},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":3588,"meta":3589,"component":3590,"responsiveStyles":3593},"builder-bd36321c1d8641a586406ac67430c6e4",{"previousId":349},{"name":351,"tag":351,"options":3591},{"align":267,"size":142,"text":2925,"redirect":3592,"redirectOpenInNewTab":41},"https://risky.biz/RBNEWSSI66/",{"large":3594},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":3596,"small":3597},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":2935,"meta":3599,"component":3601,"responsiveStyles":3604},{"previousId":3600},"builder-158300265d774a069c78c284efa920c4",{"name":366,"tag":366,"options":3602},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3603},[],{"large":3605,"small":3606},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":2945,"meta":3608,"component":3610,"responsiveStyles":3612},{"previousId":3609},"builder-b693be76949c4e0ba5dcc66008c93530",{"name":378,"options":3611},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3613,"small":3614},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3616,"@type":106,"tagName":131,"properties":3617,"responsiveStyles":3618},"builder-pixel-80mu9p56ogx",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3619},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3621},{"path":37,"query":3622},{},{},1744207753254,1744207753238,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F65947927cd1443ff98c8dc03493a351d",{"folders":3628,"createdDate":3629,"id":3071,"name":3630,"modelId":235,"published":13,"meta":3631,"query":3635,"data":3638,"variations":3738,"lastUpdated":3739,"firstPublished":3740,"testRatio":33,"screenshot":3741,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744207083197,"Risky business 764",{"breakpoints":3632,"originalContentId":3633,"hasLinks":6,"kind":228,"lastPreviewUrl":3634,"winningTest":118},{"small":39,"medium":40},"bb46c0d1ea2c4bea957f2904aecafd8e","https://app.dev.pushsecurity.com/resources/riskybusiness-071824?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=7324e2c7047746e1aab0c4d5c6419537&builder.overrides.7324e2c7047746e1aab0c4d5c6419537=7324e2c7047746e1aab0c4d5c6419537&builder.options.includeRefs=true&builder.options.enrich=true",[3636],{"@type":162,"property":163,"operator":164,"value":3637},"/resources/riskybusiness-071824",{"description":3639,"type":1001,"themeId":6,"title":3640,"seoDescription":3639,"coverImage":3641,"seoTitle":3640,"blocks":3642,"url":3637,"state":3735},"Luke Jennings joins this week's show to discuss how phish-kit crews are driving the arms race forward, and how detection has to adapt and go where the users are. ","Risky Business #764 w/ Luke Jennings","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd4389c9627284c5fa3c960a36ac14516",[3643,3713,3722,3730],{"@type":106,"@version":107,"id":3083,"meta":3644,"component":3646,"responsiveStyles":3710},{"previousId":3645},"builder-4ceb96fbc2ac4f52b00e1a04b75dddcf",{"name":250,"options":3647},{"columns":3648,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3649,3686],{"blocks":3650,"width":311},[3651,3660,3669],{"@type":106,"@version":107,"id":3652,"meta":3653,"component":3654,"responsiveStyles":3657},"builder-c4ec329f153749b3a4b012251dee53b9",{"previousId":258},{"name":260,"tag":260,"options":3655},{"title":3656,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business:\u003C/span>\u003C/p>\u003Cp>How Phish Kits are Evading Detection\u003C/p>",{"large":3658,"small":3659},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3661,"component":3662,"responsiveStyles":3667},"builder-4bce8b34cd154f718513c0dba662c50a",{"name":301,"options":3663},{"options":3664},[3665],{"optionTitle":3104,"description":3666},"\u003Cp>Luke Jennings joins this week's show to discuss how phish-kit crews are driving the arms race forward, and how detection has to adapt and go where the users are. \u003C/p>",{"large":3668},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3670,"component":3671,"responsiveStyles":3683},"builder-9a6e97cd0b914aa7a04e5ec99a97ad04",{"name":317,"options":3672},{"hosts":3673},[3674],{"host":3675},{"@type":17,"id":788,"model":190,"value":3676},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":3677,"data":3678,"variations":3679,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":3680,"meta":3681,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":3682,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":3684,"small":3685},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3687,"width":357},[3688,3696,3703],{"@type":106,"@version":107,"id":3689,"meta":3690,"component":3691,"responsiveStyles":3694},"builder-4fb86dee4c18493ba2b3592354848785",{"previousId":290},{"name":292,"options":3692},{"videoId":3693},"uPjcpKPYF8g",{"large":3695},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3697,"meta":3698,"component":3699,"responsiveStyles":3701},"builder-c0b7f29b9b6b4050bde3b9b0c17ff86c",{"previousId":338},{"name":340,"options":3700},{"text":813},{"large":3702},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3704,"meta":3705,"component":3706,"responsiveStyles":3708},"builder-6ec49ebb2c8946f182e03ff147605004",{"previousId":349},{"name":351,"tag":351,"options":3707},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3709},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3711,"small":3712},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3155,"meta":3714,"component":3716,"responsiveStyles":3719},{"previousId":3715},"builder-14e78cb273844013a5b41a3bc110b998",{"name":366,"tag":366,"options":3717},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3718},[],{"large":3720,"small":3721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3165,"meta":3723,"component":3725,"responsiveStyles":3727},{"previousId":3724},"builder-6830e5a9104f47fba2160d0af2495e6a",{"name":378,"options":3726},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3728,"small":3729},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3731,"@type":106,"tagName":131,"properties":3732,"responsiveStyles":3733},"builder-pixel-4e529koe1ax",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3734},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3736},{"path":37,"query":3737},{},{},1744207460868,1744207460849,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6b819abd6e1440808662db396496dd84",{"folders":3743,"createdDate":3744,"id":2736,"name":3745,"modelId":235,"published":13,"meta":3746,"query":3749,"data":3752,"variations":3853,"lastUpdated":3854,"firstPublished":3855,"testRatio":33,"screenshot":3856,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737046907462,"On-demand webinar: Infostealers",{"breakpoints":3747,"winningTest":118,"kind":228,"originalContentId":3290,"lastPreviewUrl":3748,"hasLinks":6},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/infostealers-webinar-ondemand/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=240a4f87fae74a1b8d0e767969f86e32&builder.overrides.240a4f87fae74a1b8d0e767969f86e32=240a4f87fae74a1b8d0e767969f86e32",[3750],{"@type":162,"property":163,"operator":164,"value":3751},"/resources/infostealers-webinar-ondemand/",{"description":3753,"seoDescription":3753,"title":3754,"themeId":6,"type":243,"seoTitle":3754,"coverImage":3755,"blocks":3756,"url":3751,"state":3850},"How attackers are stealing your cookies and bypassing MFA.","On-demand webinar: Infostealers 2.0","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7de57b14f4544cd0bf134b0ba625460d",[3757,3828,3837,3845],{"@type":106,"@version":107,"id":3758,"meta":3759,"component":3760,"responsiveStyles":3825},"builder-a87f2c635475422eaaf6732c925ab701",{"previousId":2621},{"name":250,"options":3761},{"columns":3762,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3763,3801],{"blocks":3764,"width":311},[3765,3774,3784],{"@type":106,"@version":107,"id":3766,"meta":3767,"component":3768,"responsiveStyles":3771},"builder-cfe80381742446d7804500ae4879e1cb",{"previousId":258},{"name":260,"tag":260,"options":3769},{"title":3770,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Infostealers 2.0:\u003C/span> How attackers are stealing your cookies to bypass MFA\u003C/p>",{"large":3772,"small":3773},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3775,"component":3776,"responsiveStyles":3782},"builder-96860273abb94f42a3645c3c76aaff2b",{"name":301,"options":3777},{"options":3778},[3779],{"optionTitle":3780,"description":3781},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Infostealers 2.0\u003C/span>\u003C/p>","\u003Cp>Attackers are increasingly using infostealers to steal authenticated user sessions, bypass MFA and take over corporate accounts. From there, they can access and steal sensitive data, take over critical functionality, and pivot to conduct more traditional attacks like deploying ransomware.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Join Luke Jennings, VP R&amp;D at Push Security, as he rolls up his sleeves to demonstrate:\u003C/strong>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cul>\u003Cli>How attackers use infostealers to steal sessions and compromise MFA-protected services like M365.\u003C/li>\u003Cli>How attackers use residential VPNs to bypass conditional access policies.\u003C/li>\u003Cli>How downstream SaaS app sessions can be stolen to avoid the need to access highly protected IDPs like Microsoft and Okta.\u003C/li>\u003C/ul>",{"large":3783},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3785,"component":3786,"responsiveStyles":3798},"builder-20c7cce15b0f4090a027cd30b9e6b1c1",{"name":317,"options":3787},{"hosts":3788},[3789],{"host":3790},{"@type":17,"id":788,"model":190,"value":3791},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":3792,"data":3793,"variations":3794,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":3795,"meta":3796,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":3797,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":3799,"small":3800},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3802,"width":357},[3803,3811,3818],{"@type":106,"@version":107,"id":3804,"meta":3805,"component":3806,"responsiveStyles":3809},"builder-c21c6231bc7c403f90d6bd6c7429273f",{"previousId":290},{"name":292,"options":3807},{"videoId":3808},"-i_PP4kR59U",{"large":3810},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3812,"meta":3813,"component":3814,"responsiveStyles":3816},"builder-a3ffcd4fb48944fd9b7a0c2d27ea2302",{"previousId":338},{"name":340,"options":3815},{"text":813},{"large":3817},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3819,"meta":3820,"component":3821,"responsiveStyles":3823},"builder-41cc3bf1708d41c0a0703e3020f56c66",{"previousId":349},{"name":351,"tag":351,"options":3822},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3824},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3826,"small":3827},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3829,"meta":3830,"component":3831,"responsiveStyles":3834},"builder-bf3e7a51e1e244159a4374cca5b1a8eb",{"previousId":2703},{"name":366,"tag":366,"options":3832},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3833},[],{"large":3835,"small":3836},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3838,"meta":3839,"component":3840,"responsiveStyles":3842},"builder-b5b9beff25064dac916741b937c0b21c",{"previousId":2712},{"name":378,"options":3841},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3843,"small":3844},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3846,"@type":106,"tagName":131,"properties":3847,"responsiveStyles":3848},"builder-pixel-ydt2i3vp0g",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3849},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3851},{"path":37,"query":3852},{},{},1742400037704,1737104439023,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98bae49a29ae42588fcd6d3a17ba0087",{"folders":3858,"createdDate":3859,"id":3633,"name":3860,"modelId":235,"published":13,"meta":3861,"query":3865,"data":3868,"variations":3968,"lastUpdated":3969,"firstPublished":3970,"testRatio":33,"screenshot":3971,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744206608521,"Google Cloud Security podcast",{"hasLinks":6,"originalContentId":3862,"breakpoints":3863,"lastPreviewUrl":3864,"winningTest":118,"kind":228},"00d03022cb4c415f9a59699258c8bb53",{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/googlecloudpodcast-072224?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=bb46c0d1ea2c4bea957f2904aecafd8e&builder.overrides.bb46c0d1ea2c4bea957f2904aecafd8e=bb46c0d1ea2c4bea957f2904aecafd8e&builder.options.includeRefs=true&builder.options.enrich=true",[3866],{"@type":162,"property":163,"operator":164,"value":3867},"/resources/googlecloudpodcast-072224",{"seoTitle":3869,"type":1001,"description":3870,"title":3869,"themeId":6,"seoDescription":3870,"coverImage":3871,"blocks":3872,"url":3867,"state":3965},"Google Cloud Security Podcast Ep182 w/ Adam Bateman","Adam Bateman, Co-Founder and CEO of Push Security, joins Anton Chuvakin to discuss the emerging ITDR category.  ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcc9bcd866054444b9f60f00e9e0a7ec4",[3873,3943,3952,3960],{"@type":106,"@version":107,"id":3645,"meta":3874,"component":3876,"responsiveStyles":3940},{"previousId":3875},"builder-b44ae6a94cfd4e2cbc0d0f54fa986859",{"name":250,"options":3877},{"columns":3878,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3879,3916],{"blocks":3880,"width":311},[3881,3890,3900],{"@type":106,"@version":107,"id":3882,"meta":3883,"component":3884,"responsiveStyles":3887},"builder-799219e8b51349048dd7b621747d72af",{"previousId":258},{"name":260,"tag":260,"options":3885},{"title":3886,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Google Cloud Security Podcast:\u003C/span>\u003C/p>\u003Cp>ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?\u003C/p>",{"large":3888,"small":3889},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":3891,"component":3892,"responsiveStyles":3898},"builder-d7546b29022e49e6b4b70e20cca43dc5",{"name":301,"options":3893},{"options":3894},[3895],{"optionTitle":3896,"description":3897},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Google Cloud Security Podcast\u003C/span>\u003C/p>","\u003Cp>Adam Bateman, Co-Founder and CEO of Push Security, joins Anton Chuvakin to discuss the emerging ITDR category.  \u003C/p>",{"large":3899},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":3901,"component":3902,"responsiveStyles":3913},"builder-bad5be76d5bf407d8f325bc0cacf6f6d",{"name":317,"options":3903},{"hosts":3904},[3905],{"host":3906},{"@type":17,"id":2020,"model":190,"value":3907},{"lastUpdatedBy":34,"folders":3908,"data":3909,"modelId":194,"query":3910,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":3911,"variations":3912,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":3914,"small":3915},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":3917,"width":357},[3918,3926,3933],{"@type":106,"@version":107,"id":3919,"meta":3920,"component":3921,"responsiveStyles":3924},"builder-cca9d62950574a24bb5b541d940badbb",{"previousId":290},{"name":292,"options":3922},{"videoId":3923},"2g1OKxyDlb4",{"large":3925},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":3927,"meta":3928,"component":3929,"responsiveStyles":3931},"builder-321fab139aa74521acf9438f384e82a2",{"previousId":338},{"name":340,"options":3930},{"text":2044},{"large":3932},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":3934,"meta":3935,"component":3936,"responsiveStyles":3938},"builder-32c8ee37d0a04e888c4ded8f8a6ff99f",{"previousId":349},{"name":351,"tag":351,"options":3937},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":3939},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":3941,"small":3942},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3715,"meta":3944,"component":3946,"responsiveStyles":3949},{"previousId":3945},"builder-651ab307d56c40a094faa7fd9dbbdb2f",{"name":366,"tag":366,"options":3947},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":3948},[],{"large":3950,"small":3951},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3724,"meta":3953,"component":3955,"responsiveStyles":3957},{"previousId":3954},"builder-19ac6ca189d24a14971bb8d0e5210cd5",{"name":378,"options":3956},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":3958,"small":3959},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":3961,"@type":106,"tagName":131,"properties":3962,"responsiveStyles":3963},"builder-pixel-6xdnw9jxum4",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":3964},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":3966},{"path":37,"query":3967},{},{},1744207037267,1744207021677,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F20600690364b4a7095cc5a239218745c",{"folders":3973,"createdDate":3974,"id":3975,"name":3976,"modelId":235,"published":13,"meta":3977,"query":3980,"data":3983,"variations":4083,"lastUpdated":4084,"firstPublished":4085,"testRatio":33,"screenshot":4086,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737048019152,"03b896e41ef44462a565ffb2687fec58","On-demand webinar: Phishing 2.0",{"hasLinks":6,"lastPreviewUrl":3978,"originalContentId":3290,"breakpoints":3979,"winningTest":118,"kind":228},"https://app.dev.pushsecurity.com/resources/phishing-detecting-evilginx-evilnovnc-muraena-and-modlishka?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=03b896e41ef44462a565ffb2687fec58&builder.overrides.03b896e41ef44462a565ffb2687fec58=03b896e41ef44462a565ffb2687fec58",{"small":39,"medium":40},[3981],{"@type":162,"property":163,"operator":164,"value":3982},"/resources/phishing-detecting-evilginx-evilnovnc-muraena-and-modlishka",{"themeId":6,"seoDescription":3984,"seoTitle":3976,"title":3976,"description":3984,"coverImage":3985,"type":243,"blocks":3986,"url":3982,"state":4080},"Phishing 2.0 – Detecting Evilginx, EvilnoVNC, Muraena and Modlishka","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fffa2f3f5a2e04f8489e725563b8d402e",[3987,4058,4067,4075],{"@type":106,"@version":107,"id":3988,"meta":3989,"component":3990,"responsiveStyles":4055},"builder-28630ab40ca54e9e9c79935c5f98d573",{"previousId":2621},{"name":250,"options":3991},{"columns":3992,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[3993,4031],{"blocks":3994,"width":311},[3995,4004,4014],{"@type":106,"@version":107,"id":3996,"meta":3997,"component":3998,"responsiveStyles":4001},"builder-f3717322e65743abb656cf212b673a1d",{"previousId":258},{"name":260,"tag":260,"options":3999},{"title":4000,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Phishing 2.0:\u003C/span> Detecting Evilginx, EvilnoVNC, Muraena &amp; Modlishka\u003C/p>",{"large":4002,"small":4003},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4005,"component":4006,"responsiveStyles":4012},"builder-73788cc26c3a4708a9295c86dd3fc5e7",{"name":301,"options":4007},{"options":4008},[4009],{"optionTitle":4010,"description":4011},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Phishing 2.0\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute AitM and BitM attacks and bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering.\u003C/span>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cspan style=\"font-size: 18px;\">They're not only harvesting credentials, but stealing live session logins for high-value platforms like Okta and M365.\u003Cspan class=\"ql-cursor\">﻿\u003C/span>\u003C/span>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cspan style=\"font-size: 18px;\">In this webinar, our VP R&amp;D, Luke Jennings, demonstrates how these tools work as well as how Push uses browser telemetry to detect these toolkits running on webpages and block users from accessing them.\u003C/span>\u003C/p>",{"large":4013},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4015,"component":4016,"responsiveStyles":4028},"builder-474e7e9af3464f5aaa0a633039ac42c8",{"name":317,"options":4017},{"hosts":4018},[4019],{"host":4020},{"@type":17,"id":788,"model":190,"value":4021},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":4022,"data":4023,"variations":4024,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":4025,"meta":4026,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":4027,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":4029,"small":4030},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4032,"width":357},[4033,4041,4048],{"@type":106,"@version":107,"id":4034,"meta":4035,"component":4036,"responsiveStyles":4039},"builder-602d992e8f3645cdbb224055e874a570",{"previousId":290},{"name":292,"options":4037},{"videoId":4038},"cR9ckk9Axcw",{"large":4040},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":4042,"meta":4043,"component":4044,"responsiveStyles":4046},"builder-e04f700f259d4ae5b5100d0288717c45",{"previousId":338},{"name":340,"options":4045},{"text":813},{"large":4047},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":4049,"meta":4050,"component":4051,"responsiveStyles":4053},"builder-4019564eb826451a85c6de45e544a44e",{"previousId":349},{"name":351,"tag":351,"options":4052},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":4054},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":4056,"small":4057},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4059,"meta":4060,"component":4061,"responsiveStyles":4064},"builder-bf50a081a3854622bb2c376fbb5ee743",{"previousId":2703},{"name":366,"tag":366,"options":4062},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4063},[],{"large":4065,"small":4066},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4068,"meta":4069,"component":4070,"responsiveStyles":4072},"builder-d817989e0f6d4c8da014359098c41b2c",{"previousId":2712},{"name":378,"options":4071},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4073,"small":4074},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4076,"@type":106,"tagName":131,"properties":4077,"responsiveStyles":4078},"builder-pixel-ykfr2f69scs",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4079},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4081},{"path":37,"query":4082},{},{},1742400100644,1737104476926,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F456c702e792d40d2b1e16112007379a8",{"folders":4088,"createdDate":4089,"id":4090,"name":4091,"modelId":235,"published":13,"meta":4092,"query":4095,"data":4098,"variations":4198,"lastUpdated":4199,"firstPublished":4200,"testRatio":33,"screenshot":4201,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737047882209,"a0aba224af28421183b3d39f544df7bd","On-demand webinar: Snowflake",{"breakpoints":4093,"winningTest":118,"hasLinks":6,"kind":228,"originalContentId":3290,"lastPreviewUrl":4094},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/snowflake-the-tip-of-the-iceberg?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=a0aba224af28421183b3d39f544df7bd&builder.overrides.a0aba224af28421183b3d39f544df7bd=a0aba224af28421183b3d39f544df7bd",[4096],{"@type":162,"property":163,"operator":164,"value":4097},"/resources/snowflake-the-tip-of-the-iceberg",{"seoDescription":4099,"description":4099,"themeId":6,"title":4091,"type":243,"coverImage":4100,"seoTitle":4091,"blocks":4101,"url":4097,"state":4195},"Snowflake: The tip of the iceberg – Three practical takeaways from the Snowflake incident.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdc9954de1ace4071adfa2f7c476c508f",[4102,4173,4182,4190],{"@type":106,"@version":107,"id":4103,"meta":4104,"component":4105,"responsiveStyles":4170},"builder-1b10d6a76aba462bbbd024eef617ec63",{"previousId":2621},{"name":250,"options":4106},{"columns":4107,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4108,4146],{"blocks":4109,"width":311},[4110,4119,4129],{"@type":106,"@version":107,"id":4111,"meta":4112,"component":4113,"responsiveStyles":4116},"builder-a8aa64b623f14f72b901e887a20328ea",{"previousId":258},{"name":260,"tag":260,"options":4114},{"title":4115,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Snowflake:\u003C/span> The tip of the iceberg — 3 practical takeaways\u003C/p>",{"large":4117,"small":4118},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4120,"component":4121,"responsiveStyles":4127},"builder-b367ef6f7a4a439c8d235aecf7f9a5a6",{"name":301,"options":4122},{"options":4123},[4124],{"optionTitle":4125,"description":4126},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Snowflake: 3 practical takeaways\u003C/span>\u003C/p>","\u003Cp>The Snowflake breach will be for cloud identity attacks what WannaCry was for Ransomware.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Touted as potentially the biggest breach in history, the Snowflake incident is a watershed moment for identity security, impacting ~165 organizations (so far) and millions of downstream customers.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Just as we had with OS security, this is the 'security by default' moment for SaaS.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Join Luke Jennings, VP R&amp;D at Push Security, to explore the practical takeaways from the incident. He'll discuss what Snowflake shows us about the complexity of the identity attack surface, and discuss the practical steps that organizations can take to investigate and respond effectively.\u003C/p>",{"large":4128},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4130,"component":4131,"responsiveStyles":4143},"builder-a0373b0677c5419ea133b7c2562c5487",{"name":317,"options":4132},{"hosts":4133},[4134],{"host":4135},{"@type":17,"id":788,"model":190,"value":4136},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":4137,"data":4138,"variations":4139,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":4140,"meta":4141,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":4142,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":4144,"small":4145},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4147,"width":357},[4148,4156,4163],{"@type":106,"@version":107,"id":4149,"meta":4150,"component":4151,"responsiveStyles":4154},"builder-e503df27b8d24196942606f246bfb8e2",{"previousId":290},{"name":292,"options":4152},{"videoId":4153},"0s0NB4L7oKU",{"large":4155},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":4157,"meta":4158,"component":4159,"responsiveStyles":4161},"builder-73f6b7151af64a008359f251bbb74b36",{"previousId":338},{"name":340,"options":4160},{"text":813},{"large":4162},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":4164,"meta":4165,"component":4166,"responsiveStyles":4168},"builder-30036172e0e64dcea6777ce6313aabcd",{"previousId":349},{"name":351,"tag":351,"options":4167},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":4169},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":4171,"small":4172},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4174,"meta":4175,"component":4176,"responsiveStyles":4179},"builder-74b75ef049d4400589d03dd7cb29c9e5",{"previousId":2703},{"name":366,"tag":366,"options":4177},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4178},[],{"large":4180,"small":4181},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4183,"meta":4184,"component":4185,"responsiveStyles":4187},"builder-6bd64ab649624b0c96071331a14bd908",{"previousId":2712},{"name":378,"options":4186},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4188,"small":4189},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4191,"@type":106,"tagName":131,"properties":4192,"responsiveStyles":4193},"builder-pixel-mg1it544zol",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4194},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4196},{"path":37,"query":4197},{},{},1742400133894,1737104465558,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F21f0c0914dc945279a321c3f3727ea89",{"folders":4203,"createdDate":4204,"id":4205,"name":4206,"modelId":235,"published":13,"meta":4207,"query":4210,"data":4213,"variations":4313,"lastUpdated":4314,"firstPublished":4315,"testRatio":33,"screenshot":4316,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737047601456,"7a84cdec738e4ccd8b3c71189557d8f5","Demonstrating ghost logins in Snowflake and how to remediate them",{"breakpoints":4208,"kind":228,"hasLinks":6,"winningTest":118,"originalContentId":3290,"lastPreviewUrl":4209},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/demonstrating-ghost-logins-in-snowflake-and-how-to-remediate-them?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=7a84cdec738e4ccd8b3c71189557d8f5&builder.overrides.7a84cdec738e4ccd8b3c71189557d8f5=7a84cdec738e4ccd8b3c71189557d8f5",[4211],{"@type":162,"property":163,"operator":164,"value":4212},"/resources/demonstrating-ghost-logins-in-snowflake-and-how-to-remediate-them",{"title":4206,"seoDescription":4214,"coverImage":4100,"description":4214,"seoTitle":4206,"type":4215,"themeId":6,"blocks":4216,"url":4212,"state":4310},"Demonstrating ghost logins in Snowflake and how to remediate them.","Video",[4217,4288,4297,4305],{"@type":106,"@version":107,"id":4218,"meta":4219,"component":4220,"responsiveStyles":4285},"builder-dcdc7b2f9dec4c2ab95090708bd7be4c",{"previousId":2621},{"name":250,"options":4221},{"columns":4222,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4223,4261],{"blocks":4224,"width":311},[4225,4234,4244],{"@type":106,"@version":107,"id":4226,"meta":4227,"component":4228,"responsiveStyles":4231},"builder-02584f810ab24cc188595eb93efd331c",{"previousId":258},{"name":260,"tag":260,"options":4229},{"title":4230,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Snowflake:\u003C/span> How to remediate ghost logins in Snowflake\u003C/p>",{"large":4232,"small":4233},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4235,"component":4236,"responsiveStyles":4242},"builder-03cde5500dbe45c2ae86122cc55883d0",{"name":301,"options":4237},{"options":4238},[4239],{"optionTitle":4240,"description":4241},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Remediating ghost logins in Snowflake\u003C/span>\u003C/p>","\u003Cp>Ghost logins are additional login methods than can exist simultaneously to the preferred default login method (e.g. SSO). Ghost logins often lack robust authentication controls such as MFA, meaning that stolen credentials for local logins with a username and password will remain valid even if an SSO login also exists for that account. These accounts will lack MFA unless specifically adopted by the user.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>This vulnerability affects the majority of SaaS apps, including Snowflake, which was recently subject to a massive malicious campaign in which accounts belonging to over 165 Snowflake customers have been compromised.\u003C/p>",{"large":4243},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4245,"component":4246,"responsiveStyles":4258},"builder-fdef4220cc764a878188748404708272",{"name":317,"options":4247},{"hosts":4248},[4249],{"host":4250},{"@type":17,"id":788,"model":190,"value":4251},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":4252,"data":4253,"variations":4254,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":4255,"meta":4256,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":4257,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":4259,"small":4260},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4262,"width":357},[4263,4271,4278],{"@type":106,"@version":107,"id":4264,"meta":4265,"component":4266,"responsiveStyles":4269},"builder-669f1a7fc77b48178e11e801e52707e0",{"previousId":290},{"name":292,"options":4267},{"videoId":4268},"5yeOAM4YCAI",{"large":4270},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":4272,"meta":4273,"component":4274,"responsiveStyles":4276},"builder-a29b7f6b7991439387b12f4479d7ae62",{"previousId":338},{"name":340,"options":4275},{"text":813},{"large":4277},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":4279,"meta":4280,"component":4281,"responsiveStyles":4283},"builder-1623aab1d1fa4863962e649fdabd3cc7",{"previousId":349},{"name":351,"tag":351,"options":4282},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":4284},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":4286,"small":4287},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4289,"meta":4290,"component":4291,"responsiveStyles":4294},"builder-c6e35bc00abe41e798b7553a3e24715e",{"previousId":2703},{"name":366,"tag":366,"options":4292},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4293},[],{"large":4295,"small":4296},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4298,"meta":4299,"component":4300,"responsiveStyles":4302},"builder-3432ce01d1f44915ac8da94eb98c8cee",{"previousId":2712},{"name":378,"options":4301},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4303,"small":4304},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4306,"@type":106,"tagName":131,"properties":4307,"responsiveStyles":4308},"builder-pixel-ol5r0ln3i3e",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4309},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4311},{"path":37,"query":4312},{},{},1742289556833,1737104451041,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2899076cd7f34d2883afb7e204cdf117",{"folders":4318,"createdDate":4319,"id":4320,"name":4321,"modelId":235,"published":13,"meta":4322,"query":4325,"data":4328,"variations":4427,"lastUpdated":4428,"firstPublished":4429,"testRatio":33,"screenshot":4430,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737048181565,"1e9c06e2402744bb8747345861e9d728","The New SaaS Cyber Kill Chain: SO-CON 2024",{"originalContentId":3290,"kind":228,"winningTest":118,"lastPreviewUrl":4323,"hasLinks":6,"breakpoints":4324},"https://app.dev.pushsecurity.com/resources/the-new-saas-cyber-kill-chain-so-con-2024?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=1e9c06e2402744bb8747345861e9d728&builder.overrides.1e9c06e2402744bb8747345861e9d728=1e9c06e2402744bb8747345861e9d728",{"small":39,"medium":40},[4326],{"@type":162,"property":163,"operator":164,"value":4327},"/resources/the-new-saas-cyber-kill-chain-so-con-2024",{"title":4321,"themeId":6,"seoDescription":4321,"seoTitle":4321,"type":4215,"description":4321,"coverImage":4329,"blocks":4330,"url":4327,"state":4424},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F17b4f7c0998f40e38a00ab242a018cdd",[4331,4402,4411,4419],{"@type":106,"@version":107,"id":4332,"meta":4333,"component":4334,"responsiveStyles":4399},"builder-4a91a3a2b1c94cb1bc5ac2e9a005c06d",{"previousId":2621},{"name":250,"options":4335},{"columns":4336,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4337,4375],{"blocks":4338,"width":311},[4339,4348,4358],{"@type":106,"@version":107,"id":4340,"meta":4341,"component":4342,"responsiveStyles":4345},"builder-df0638f86bf54a489d863518fb740981",{"previousId":258},{"name":260,"tag":260,"options":4343},{"title":4344,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">SO-CON 2024:\u003C/span> The new SaaS cyber kill chain\u003C/p>",{"large":4346,"small":4347},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4349,"component":4350,"responsiveStyles":4356},"builder-e1f34a529e7a4ba49d028f694455e1e8",{"name":301,"options":4351},{"options":4352},[4353],{"optionTitle":4354,"description":4355},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> The new SaaS cyber kill chain\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">This talk considers what a new SaaS cyber kill chain looks like for modern organizations that are fully SaaS native without any concept of an internal network, and the surprising number of attacks that are possible without touching company owned endpoints or infrastructure.\u003C/span>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Once upon a time, we thought of cyber attacks in terms of recon, port scanning, enumeration, vulnerability identification and exploitation and we had various approaches we would use to frustrate attackers at every phase.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>As the cat and mouse game of security continued, this eventually morphed into an endpoint compromise focused process involving initial access, exploitation, persistence, command and control and lateral movement inside a complex internal network. But with the remote working and SaaS revolution, the way organizations work has changed radically – so what does the cyber kill chain look like now?\u003C/p>",{"large":4357},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4359,"component":4360,"responsiveStyles":4372},"builder-1e2e982aa37e471fa6a28520c406429b",{"name":317,"options":4361},{"hosts":4362},[4363],{"host":4364},{"@type":17,"id":788,"model":190,"value":4365},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":4366,"data":4367,"variations":4368,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":4369,"meta":4370,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":4371,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":4373,"small":4374},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4376,"width":357},[4377,4385,4392],{"@type":106,"@version":107,"id":4378,"meta":4379,"component":4380,"responsiveStyles":4383},"builder-2c1d051c1bcb47349dcc0ec2d5293bdf",{"previousId":290},{"name":292,"options":4381},{"videoId":4382},"2Nmfc1KR94E",{"large":4384},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":4386,"meta":4387,"component":4388,"responsiveStyles":4390},"builder-d47bbe6387b246e1b57890817ccd3820",{"previousId":338},{"name":340,"options":4389},{"text":813},{"large":4391},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":4393,"meta":4394,"component":4395,"responsiveStyles":4397},"builder-e933baf82bf4447291de7c098c1aea9b",{"previousId":349},{"name":351,"tag":351,"options":4396},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":4398},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":4400,"small":4401},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4403,"meta":4404,"component":4405,"responsiveStyles":4408},"builder-48e777150533416d9749dd7b042484c5",{"previousId":2703},{"name":366,"tag":366,"options":4406},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4407},[],{"large":4409,"small":4410},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4412,"meta":4413,"component":4414,"responsiveStyles":4416},"builder-00c31fba48f84b97a68a75f78ad83b4c",{"previousId":2712},{"name":378,"options":4415},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4417,"small":4418},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4420,"@type":106,"tagName":131,"properties":4421,"responsiveStyles":4422},"builder-pixel-8mcjurvd08o",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4423},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4425},{"path":37,"query":4426},{},{},1742289663198,1737104487849,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fde1d20300273467484851a90ff7998a3",{"createdDate":4432,"id":3060,"name":4433,"modelId":235,"published":13,"meta":4434,"query":4438,"data":4441,"variations":4527,"lastUpdated":4528,"firstPublished":4529,"testRatio":33,"screenshot":4530,"createdBy":53,"lastUpdatedBy":72,"folders":4531,"rev":408},1736939151615,"SaaS Attacks Report",{"originalContentId":4435,"hasLinks":6,"winningTest":118,"lastPreviewUrl":4436,"kind":228,"breakpoints":4437},"531bfe1492984a099718131aaa53b743","https://pushsecurity.com/resources/saas-attacks-report?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=7f3db2852bf84fed8e0e8659ba857d6c&builder.overrides.7f3db2852bf84fed8e0e8659ba857d6c=7f3db2852bf84fed8e0e8659ba857d6c&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},[4439],{"@type":162,"property":163,"operator":164,"value":4440},"/resources/saas-attacks-report",{"description":4442,"coverImage":4443,"type":420,"seoTitle":4444,"seoDescription":4442,"themeId":6,"title":4444,"blocks":4445,"url":4440,"state":4524},"How SaaS attacks evolved in 2024 and what we can expect to see more of in 2025.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe71e3dbee95442a88b34463180ca3a83","SaaS Attacks Report: 2024 Edition",[4446,4519],{"@type":106,"@version":107,"id":2977,"meta":4447,"component":4449,"responsiveStyles":4517},{"previousId":4448},"builder-adfeca5bf81a4650aee4e14e698af3f2",{"name":250,"options":4450,"isRSC":118},{"columns":4451,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4452],{"blocks":4453},[4454,4502,4510],{"@type":106,"@version":107,"id":4455,"component":4456,"responsiveStyles":4500},"builder-400a47dc19014198b7d0337d0e317530",{"name":250,"options":4457,"isRSC":118},{"columns":4458,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4459,4491],{"blocks":4460},[4461,4468,4475],{"@type":106,"@version":107,"layerName":260,"id":4462,"component":4463,"responsiveStyles":4466},"builder-7ab6a9bc13134674b500d1cd23efd260",{"name":260,"tag":260,"options":4464,"isRSC":118},{"title":4465},"\u003Cp>SaaS Attacks Report: \u003C/p>\u003Cp>\u003Cspan style=\"color: rgb(249, 66, 30);\">2024 Edition\u003C/span>\u003C/p>",{"large":4467},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":4469,"component":4470,"responsiveStyles":4473},"builder-f0b55d97fded457a81ddd03685271384",{"name":533,"tag":533,"options":4471,"isRSC":118},{"description":4472},"\u003Cp>Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. We’ve pulled together all the techniques we're aware of and added a bunch of new ones. Now updated for 2024!\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>In this guide, you'll learn about:\u003C/strong>\u003C/p>",{"large":4474},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":4476,"component":4477,"responsiveStyles":4489},"builder-986bd4d37760448f83fdff190e17c78a",{"name":4478,"tag":4478,"options":4479,"isRSC":118},"PointsList",{"pointsList":4480},[4481,4483,4485,4487],{"value":4482},"The SaaS Attacks Matrix and how it can benefit  your red and blue teams",{"value":4484},"New SaaS-focused variations of older attacks",{"value":4486},"Brand new attack techniques against SaaS-native and hybrid organizations",{"value":4488},"What the cyber kill chain looks like when applied  to SaaS-native and hybrid organizations",{"large":4490},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"blocks":4492},[4493],{"@type":106,"@version":107,"id":4494,"component":4495,"responsiveStyles":4498},"builder-fe5f503c2867424f9353394a6a440309",{"name":547,"tag":547,"options":4496,"isRSC":118},{"chiliPiper":6,"prodFormId":3022,"formTitle":37,"segmentId":1340,"segmentFriendlyName":87,"downloadFile":4497,"subscribeForEmail":41},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff3db37ee674485f8ad79f8158b1c1f8?alt=media&token=972fa495-e3cd-4ce8-b0a2-dda1faa988eb&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":4499},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"large":4501},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":345,"marginRight":345,"maxWidth":274},{"@type":106,"@version":107,"id":4503,"meta":4504,"component":4505,"responsiveStyles":4507},"builder-621039236c6141a6b2be62938d63d32a",{"previousId":558},{"name":366,"tag":366,"options":4506,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":4508,"small":4509},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":310},{"display":140},{"@type":106,"@version":107,"id":4511,"meta":4512,"component":4513,"responsiveStyles":4515},"builder-411d387d4b95465bb4e719a7bcc58502",{"previousId":567},{"name":378,"options":4514,"isRSC":118},{"image":3041,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384},{"large":4516},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"large":4518},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":4520,"@type":106,"tagName":131,"properties":4521,"responsiveStyles":4522},"builder-pixel-83wptof8ydc",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4523},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4525},{"path":37,"query":4526},{},{},1761743388317,1736941015169,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F486f6786bebe442b97c13eb782708074",[],{"folders":4533,"createdDate":4534,"id":4535,"name":4536,"modelId":235,"published":13,"meta":4537,"query":4541,"data":4544,"variations":4644,"lastUpdated":4645,"firstPublished":4646,"testRatio":33,"screenshot":4647,"createdBy":34,"lastUpdatedBy":34,"rev":408},[],1744206291248,"fe213f35e48d466ca3ef4aaaf3ce018a","CISO Series — Securing Identities in the Cloud",{"kind":228,"breakpoints":4538,"lastPreviewUrl":4539,"winningTest":118,"hasLinks":6,"originalContentId":4540},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/ciso-series-062724?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2Cadmin%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Admin&builder.user.role.id=admin&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=fe213f35e48d466ca3ef4aaaf3ce018a&builder.overrides.fe213f35e48d466ca3ef4aaaf3ce018a=fe213f35e48d466ca3ef4aaaf3ce018a&builder.options.includeRefs=true&builder.options.enrich=true","d1c02ad09b034f48853cd26243ce5c9e",[4542],{"@type":162,"property":163,"operator":164,"value":4543},"/resources/ciso-series-062724",{"seoDescription":4545,"themeId":6,"seoTitle":4546,"type":1001,"coverImage":4547,"description":4545,"title":4548,"blocks":4549,"url":4543,"state":4641},"Push CEO & co-founder Adam Bateman appeared on the CISO Series podcast to discuss: How are we securing identity in the cloud?","CISO Series: Securing Identities in the Cloud","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F62b3e3b884d84a9cbaebca7576016f5b","Adam Bateman appears on CISO Series Podcast",[4550,4617,4627,4636],{"@type":106,"@version":107,"id":4551,"meta":4552,"component":4554,"responsiveStyles":4614},"builder-057848dcc61642abb12ab5460f385143",{"previousId":4553},"builder-694e419d9e014164abdac9eec69f8852",{"name":250,"options":4555},{"columns":4556,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4557,4594],{"blocks":4558,"width":311},[4559,4568,4578],{"@type":106,"@version":107,"id":4560,"meta":4561,"component":4562,"responsiveStyles":4565},"builder-9ae4473753d34cae99036ba9d9a7f2a0",{"previousId":258},{"name":260,"tag":260,"options":4563},{"title":4564,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">CISO Series:\u003C/span>\u003C/p>\u003Cp>Securing Identities in the Cloud\u003C/p>",{"large":4566,"small":4567},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4569,"component":4570,"responsiveStyles":4576},"builder-f370766811c24ca798e8368bb4d7a7a9",{"name":301,"options":4571},{"options":4572},[4573],{"optionTitle":4574,"description":4575},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> CISO Series\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder Adam Bateman appeared on the CISO Series podcast to discuss: \u003C/span>How are we securing identity in the cloud? Unlike on-prem, the cloud requires you to cede control to a vendor. So what can we do to keep identities safe?\u003C/p>",{"large":4577},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4579,"component":4580,"responsiveStyles":4591},"builder-ea1219c11fdf44ba8ef7b1d6f168f5a5",{"name":317,"options":4581},{"hosts":4582},[4583],{"host":4584},{"@type":17,"id":2020,"model":190,"value":4585},{"lastUpdatedBy":34,"folders":4586,"data":4587,"modelId":194,"query":4588,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":4589,"variations":4590,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":4592,"small":4593},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4595,"width":357},[4596,4606],{"@type":106,"@version":107,"id":4597,"component":4598,"responsiveStyles":4604},"builder-31531838de60455c92be6a1e1a52b6bb",{"name":378,"options":4599},{"image":4600,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":4601,"lockAspectRatio":6,"height":4602,"width":430,"sizes":4603},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F59574048ce50429cb7d57fff8eae6a40?format=webp&width=574",0.668,801,"(max-width: 638px) 90vw, (max-width: 998px) 22vw, 38vw",{"large":4605},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":4607,"meta":4608,"component":4609,"responsiveStyles":4612},"builder-6f8c645271d042769130a834996b835f",{"previousId":349},{"name":351,"tag":351,"options":4610},{"align":267,"size":142,"text":2925,"redirect":4611,"redirectOpenInNewTab":41},"https://cisoseries.com/securing-identities-in-the-cloud/",{"large":4613},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":4615,"small":4616},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4618,"meta":4619,"component":4621,"responsiveStyles":4624},"builder-5a08920dde5243f9a14f968e9306ee6c",{"previousId":4620},"builder-7b098bda91e84b9fa651bd5016930037",{"name":366,"tag":366,"options":4622},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4623},[],{"large":4625,"small":4626},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4628,"meta":4629,"component":4631,"responsiveStyles":4633},"builder-a088c8ba1f0f46ed825f8429c24cb2ea",{"previousId":4630},"builder-144569ab85c54fe7a0e0e246b9814495",{"name":378,"options":4632},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":4634,"small":4635},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4637,"@type":106,"tagName":131,"properties":4638,"responsiveStyles":4639},"builder-pixel-pqy5acq266e",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4640},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4642},{"path":37,"query":4643},{},{},1745572945030,1744206484240,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1dc7d147fc5e4260b400e61cb8f74e5c",{"folders":4649,"createdDate":4650,"id":3524,"name":4651,"modelId":235,"published":13,"meta":4652,"query":4656,"data":4659,"variations":4750,"lastUpdated":4751,"firstPublished":4752,"testRatio":33,"screenshot":4753,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744206060567,"Risky Business snake oilers '24",{"hasLinks":6,"lastPreviewUrl":4653,"breakpoints":4654,"originalContentId":4655,"kind":228,"winningTest":118},"https://app.dev.pushsecurity.com/resources/riskybusiness-151123?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=e8d26de4d64a489cb5c87ec88b359e6b&builder.overrides.e8d26de4d64a489cb5c87ec88b359e6b=e8d26de4d64a489cb5c87ec88b359e6b&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},"b6b4aa2bfee14f79aa597a8b80a94d57",[4657],{"@type":162,"property":163,"operator":164,"value":4658},"/resources/riskybusiness-151123",{"seoTitle":4660,"title":4660,"description":4661,"coverImage":4662,"seoDescription":4661,"type":1001,"themeId":6,"blocks":4663,"url":4658,"state":4747},"Adam Bateman appears on the Risky Business podcast","In this edition of Snake Oilers we’ll be hearing from Push Security: A browser plugin-based security company that combats identity-based attacks.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa60a95964a6f49e9b615cf0ac173326a",[4664,4725,4734,4742],{"@type":106,"@version":107,"id":3535,"meta":4665,"component":4667,"responsiveStyles":4722},{"previousId":4666},"builder-97568f968da44c6a979674d24e7a64af",{"name":250,"options":4668},{"columns":4669,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4670,4706],{"blocks":4671,"width":311},[4672,4681,4690],{"@type":106,"@version":107,"id":4673,"meta":4674,"component":4675,"responsiveStyles":4678},"builder-953b78b83ede4924886b0151c1c7ae40",{"previousId":258},{"name":260,"tag":260,"options":4676},{"title":4677,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business:\u003C/span>\u003C/p>\u003Ch2>Snake Oilers: Push Security\u003C/h2>",{"large":4679,"small":4680},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4682,"component":4683,"responsiveStyles":4688},"builder-7abe36f2ba3b4eda8a49dcc205509d7b",{"name":301,"options":4684},{"options":4685},[4686],{"optionTitle":3556,"description":4687},"\u003Cp>In this edition of Snake Oilers we’ll be hearing from Push Security: A browser plugin-based security company that combats identity-based attacks.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",{"large":4689},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4691,"component":4692,"responsiveStyles":4703},"builder-12cd6c5a69974ffe9b1d7c99a66f3166",{"name":317,"options":4693},{"hosts":4694},[4695],{"host":4696},{"@type":17,"id":2020,"model":190,"value":4697},{"lastUpdatedBy":34,"folders":4698,"data":4699,"modelId":194,"query":4700,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":4701,"variations":4702,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":4704,"small":4705},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4707,"width":357},[4708,4714],{"@type":106,"@version":107,"id":4709,"component":4710,"responsiveStyles":4712},"builder-e1a23c4992d54d39b3a472cbab323bda",{"name":378,"options":4711},{"image":3583,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":3584,"width":3584},{"large":4713},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":4715,"meta":4716,"component":4717,"responsiveStyles":4720},"builder-5abd11afcf4846af9cc44588eb3f042b",{"previousId":349},{"name":351,"tag":351,"options":4718},{"align":267,"size":142,"text":2925,"redirect":4719,"redirectOpenInNewTab":41},"https://risky.biz/snakeoilers19pt2/",{"large":4721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":4723,"small":4724},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3600,"meta":4726,"component":4728,"responsiveStyles":4731},{"previousId":4727},"builder-228c0ed893ce4335af1be6e505144f96",{"name":366,"tag":366,"options":4729},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4730},[],{"large":4732,"small":4733},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3609,"meta":4735,"component":4737,"responsiveStyles":4739},{"previousId":4736},"builder-f84e8444bdb7494c9520a9170ec2f4d0",{"name":378,"options":4738},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4740,"small":4741},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4743,"@type":106,"tagName":131,"properties":4744,"responsiveStyles":4745},"builder-pixel-74nx4ca7qq6",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4746},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4748},{"path":37,"query":4749},{},{},1744206254970,1744206254941,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb9b606b95777453f9b17f49fddf0aff8",{"createdDate":4755,"id":4756,"name":4757,"modelId":235,"published":13,"query":4758,"data":4761,"variations":4862,"lastUpdated":4863,"firstPublished":4864,"testRatio":33,"screenshot":4865,"createdBy":53,"lastUpdatedBy":148,"folders":4866,"meta":4867,"rev":408},1737026781382,"c8d6bc4630e842d994b74b6ea7d02b81","A phisher's guide to Slack book",[4759],{"@type":162,"property":163,"operator":164,"value":4760},"/resources/phishing-slack",{"seoDescription":4762,"seoTitle":4763,"themeId":6,"coverImage":4764,"title":4763,"description":4765,"type":420,"blocks":4766,"url":4760,"state":4859},"Using Slack to conduct phishing attacks","A Phisher’s Guide to Slack","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa9af298954e44b57a6f1da575d47afad","In this guide on external phishing attacks via Slack, we'll show red teamers and pentesters how to get initial access as the first step in the attack kill chain.",[4767,4854],{"@type":106,"@version":107,"id":4768,"meta":4769,"component":4770,"responsiveStyles":4852},"builder-872336e0e3814b30b0c8f198924278b6",{"previousId":3205},{"name":250,"options":4771,"isRSC":118},{"columns":4772,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4773],{"blocks":4774},[4775,4783,4835,4842],{"@type":106,"@version":107,"layerName":260,"id":4776,"meta":4777,"component":4778,"responsiveStyles":4781},"builder-146042f837364541bd49f571e88694e2",{"previousId":3221},{"name":260,"tag":260,"options":4779,"isRSC":118},{"title":4780,"isCentered":6},"\u003Ch1>\u003Cspan style=\"color: rgb(255, 102, 36);\">Ebook\u003C/span>\u003Cbr />A Phisher’s Guide to Slack\u003C/h1>\n",{"large":4782},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":250,"id":4784,"component":4785,"responsiveStyles":4833},"builder-a1b3180f1fca49259a4667e87bcaa837",{"name":250,"options":4786,"isRSC":118},{"columns":4787,"space":539,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4788,4820],{"blocks":4789},[4790,4798,4813],{"@type":106,"@version":107,"layerName":533,"id":4791,"meta":4792,"component":4793,"responsiveStyles":4796},"builder-a203066b16cf4a7d8d175a35ee34543d",{"previousId":3230},{"name":533,"tag":533,"options":4794,"isRSC":118},{"description":4795},"\u003Cp>Unlike phishing via email, IM apps and the messages within them are typically more trusted by employees, making social engineering via Slack a juicy target.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>In this guide on external phishing attacks via Slack, we'll show red teamers and pentesters how to get initial access as the first step in the attack kill chain. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Once you've got a foothold on Slack, we'll show you:\u003C/strong>\u003C/p>",{"large":4797},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":124,"marginBottom":266},{"@type":106,"@version":107,"id":4799,"component":4800,"responsiveStyles":4811},"builder-e20150fefb444da38a107f4bd8293fa2",{"name":4478,"tag":4478,"options":4801,"isRSC":118},{"pointsList":4802},[4803,4805,4807,4809],{"value":4804},"New attack possibilities that help you gain and maintain persistence",{"value":4806},"How to conduct more advanced social engineering attacks to move laterally",{"value":4808},"Link-spoofing techniques that can make phishing links much harder to spot",{"value":4810},"How malicious Slack messages can be modified later to replace the phishing link, covering your tracks",{"large":4812},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":4814,"component":4815,"responsiveStyles":4818},"builder-2b8f239b17ae40d8b9d8ca9fb23d3e1b",{"name":351,"tag":351,"options":4816,"isRSC":118},{"text":87,"align":267,"size":142,"download":4817},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1db48e2392604773a42766330affe675?alt=media&token=a3c0556e-4a18-432e-93fc-c3b2d9eac680&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":4819},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1798,"paddingBottom":1798},{"blocks":4821},[4822],{"@type":106,"@version":107,"layerName":378,"id":4823,"meta":4824,"component":4825,"responsiveStyles":4831},"builder-cdde4ef584634acf8eb3e3548c92d9aa",{"previousId":3248},{"name":378,"options":4826,"isRSC":118},{"image":4827,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":4828,"lockAspectRatio":6,"height":3012,"width":4829,"sizes":4830},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F810a859cafe5454993c733312b716f04?width=387",1.416,1059,"(max-width: 638px) 53vw, (max-width: 998px) 28vw, 28vw",{"large":4832},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":3256,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"large":4834},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":4836,"component":4837,"responsiveStyles":4839},"builder-3594e7784d2943a1b813fbfb489dec00",{"name":366,"tag":366,"options":4838,"isRSC":118},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41},{"large":4840,"small":4841},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265},{"display":140},{"@type":106,"@version":107,"id":4843,"meta":4844,"component":4845,"responsiveStyles":4849},"builder-1efd48d6d4c84a14823a8ef6b20d9eea",{"previousId":567},{"name":378,"options":4846,"isRSC":118},{"image":4847,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":571,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":4848},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a?width=1307","(max-width: 638px) 88vw, (max-width: 998px) 93vw, 94vw",{"large":4850,"small":4851},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":332},{"marginTop":310},{"large":4853},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"maxWidth":274},{"id":4855,"@type":106,"tagName":131,"properties":4856,"responsiveStyles":4857},"builder-pixel-q1m0zbp7ah",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4858},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4860},{"path":37,"query":4861},{},{},1774025660153,1737104378849,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F16f20b428d74456db171d31db9d13383",[],{"kind":228,"originalContentId":3189,"breakpoints":4868,"winningTest":118,"hasLinks":6,"lastPreviewUrl":4869,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/resources/phishing-slack?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=c8d6bc4630e842d994b74b6ea7d02b81&builder.overrides.c8d6bc4630e842d994b74b6ea7d02b81=c8d6bc4630e842d994b74b6ea7d02b81&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"folders":4871,"createdDate":4872,"id":4873,"name":4874,"modelId":235,"published":13,"meta":4875,"query":4879,"data":4882,"variations":4980,"lastUpdated":4981,"firstPublished":4982,"testRatio":33,"screenshot":4983,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744205463028,"4468d25dec34415e8ee171704d32a4a7","BlueHat podcast",{"kind":228,"hasLinks":6,"breakpoints":4876,"winningTest":118,"originalContentId":4877,"lastPreviewUrl":4878},{"small":39,"medium":40},"87ce6bf9ddf44f9ea132b0a245398f3f","https://app.dev.pushsecurity.com/resources/bluehat-041724?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=4468d25dec34415e8ee171704d32a4a7&builder.overrides.4468d25dec34415e8ee171704d32a4a7=4468d25dec34415e8ee171704d32a4a7&builder.options.includeRefs=true&builder.options.enrich=true",[4880],{"@type":162,"property":163,"operator":164,"value":4881},"/resources/bluehat-041724",{"description":4883,"coverImage":4884,"type":1001,"themeId":6,"seoDescription":4883,"title":4885,"seoTitle":4885,"blocks":4886,"url":4881,"state":4977},"Luke Jennings, VP of Research & Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4932ccb4edfa4293834e7c799a5f71f3","Luke Jennings appears on the MSRC BlueHat Podcast",[4887,4953,4963,4972],{"@type":106,"@version":107,"id":4888,"meta":4889,"component":4891,"responsiveStyles":4950},"builder-7ed69bc0c4ee4caa8ff05e05db96b975",{"previousId":4890},"builder-1ea71783d5af47fab1e36de7da39917c",{"name":250,"options":4892},{"columns":4893,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[4894,4932],{"blocks":4895,"width":311},[4896,4905,4915],{"@type":106,"@version":107,"id":4897,"meta":4898,"component":4899,"responsiveStyles":4902},"builder-0901490d47ce4058a210d7508def1182",{"previousId":258},{"name":260,"tag":260,"options":4900},{"title":4901,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">The BlueHat Podcast\u003C/span>\u003C/p>\u003Cp>SaaS Exposed: Unmasking Cyber Risks in Cloud Integrations\u003C/p>",{"large":4903,"small":4904},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":4906,"component":4907,"responsiveStyles":4913},"builder-c025599683b14162859614d9ba727573",{"name":301,"options":4908},{"options":4909},[4910],{"optionTitle":4911,"description":4912},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Cyber Ranch\u003C/span>\u003C/p>","\u003Cp>Luke Jennings, VP of Research &amp; Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. \u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",{"large":4914},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":4916,"component":4917,"responsiveStyles":4929},"builder-96d01e8d3e654930bc75c88b6ceaec74",{"name":317,"options":4918},{"hosts":4919},[4920],{"host":4921},{"@type":17,"id":788,"model":190,"value":4922},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":4923,"data":4924,"variations":4925,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":4926,"meta":4927,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":4928,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":4930,"small":4931},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":4933,"width":357},[4934,4942],{"@type":106,"@version":107,"id":4935,"component":4936,"responsiveStyles":4940},"builder-fe7db5fb28df431fae1b219c348aa758",{"name":378,"options":4937},{"image":4938,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":4939,"width":4939},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3352cdf62b044cb283d035a3745af12d",400,{"large":4941},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"@type":106,"@version":107,"id":4943,"meta":4944,"component":4945,"responsiveStyles":4948},"builder-5014aefc55e94f559dc3ccab7c10352f",{"previousId":349},{"name":351,"tag":351,"options":4946},{"align":267,"size":142,"text":2925,"redirect":4947,"redirectOpenInNewTab":41},"https://podcasts.apple.com/us/podcast/saas-exposed-unmasking-cyber-risks-in-cloud-integrations/id1688087915?i=1000652706974",{"large":4949},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":4951,"small":4952},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4954,"meta":4955,"component":4957,"responsiveStyles":4960},"builder-1e208f90ecae4f8bb287c13b2a4cb6da",{"previousId":4956},"builder-878480f70150490bb9c9ad14ba5867c6",{"name":366,"tag":366,"options":4958},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":4959},[],{"large":4961,"small":4962},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4964,"meta":4965,"component":4967,"responsiveStyles":4969},"builder-fefc2a717e364d38912ddf883b662596",{"previousId":4966},"builder-1fd9f1ebc6b844a4a7659db164f6f700",{"name":378,"options":4968},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":4970,"small":4971},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":4973,"@type":106,"tagName":131,"properties":4974,"responsiveStyles":4975},"builder-pixel-6llcmj012ap",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":4976},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":4978},{"path":37,"query":4979},{},{},1744205754542,1744205754518,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F481a6015d3a0490fa0ee4e6cf559f58b",{"folders":4985,"createdDate":4986,"id":4987,"name":4988,"modelId":235,"published":13,"meta":4989,"query":4992,"data":4995,"variations":5095,"lastUpdated":5096,"firstPublished":5097,"testRatio":33,"screenshot":5098,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744205138102,"24988a448fd54fa29a682f91b61b148c","Cyber on the edge",{"lastPreviewUrl":4990,"winningTest":118,"originalContentId":3862,"breakpoints":4991,"kind":228,"hasLinks":6},"https://app.dev.pushsecurity.com/resources/cyberontheedge-031824?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=24988a448fd54fa29a682f91b61b148c&builder.overrides.24988a448fd54fa29a682f91b61b148c=24988a448fd54fa29a682f91b61b148c&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[4993],{"@type":162,"property":163,"operator":164,"value":4994},"/resources/cyberontheedge-031824",{"description":4996,"type":1001,"title":4997,"themeId":6,"seoDescription":4996,"coverImage":4998,"seoTitle":4997,"blocks":4999,"url":4994,"state":5092},"Adam Bateman, Co-Founder and CEO of Push Security, explores loving the grind of a start-up, how to win customers in new spaces, and the value of good mentors.","Cyber on the Edge w/ Adam Bateman","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb04b9c90dbfc40aca316c79b3a81be78",[5000,5070,5079,5087],{"@type":106,"@version":107,"id":5001,"meta":5002,"component":5003,"responsiveStyles":5067},"builder-4f6d2c4d22f848a3951a0f05209294cc",{"previousId":3875},{"name":250,"options":5004},{"columns":5005,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5006,5043],{"blocks":5007,"width":311},[5008,5017,5027],{"@type":106,"@version":107,"id":5009,"meta":5010,"component":5011,"responsiveStyles":5014},"builder-e1be50d65027433dba045eed86546dd1",{"previousId":258},{"name":260,"tag":260,"options":5012},{"title":5013,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Cyber on the Edge:\u003C/span>\u003C/p>\u003Cp>Adam Bateman\u003C/p>",{"large":5015,"small":5016},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5018,"component":5019,"responsiveStyles":5025},"builder-7e3f96b36f7f4cd488e0302708e94c5c",{"name":301,"options":5020},{"options":5021},[5022],{"optionTitle":5023,"description":5024},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Cyber on the Edge\u003C/span>\u003C/p>","\u003Cp>Adam Bateman, Co-Founder and CEO of Push Security, explores loving the grind of a start-up, how to win customers in new spaces, and the value of good mentors. \u003C/p>",{"large":5026},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5028,"component":5029,"responsiveStyles":5040},"builder-ba4847a5677b477da4505238a7086cfd",{"name":317,"options":5030},{"hosts":5031},[5032],{"host":5033},{"@type":17,"id":2020,"model":190,"value":5034},{"lastUpdatedBy":34,"folders":5035,"data":5036,"modelId":194,"query":5037,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":5038,"variations":5039,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":5041,"small":5042},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5044,"width":357},[5045,5053,5060],{"@type":106,"@version":107,"id":5046,"meta":5047,"component":5048,"responsiveStyles":5051},"builder-8fbbc5634c754c17803848ee92d7d610",{"previousId":290},{"name":292,"options":5049},{"videoId":5050},"cIFAgrSK5Xo",{"large":5052},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5054,"meta":5055,"component":5056,"responsiveStyles":5058},"builder-e666be9e61984e6c87798023026a473c",{"previousId":338},{"name":340,"options":5057},{"text":2044},{"large":5059},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5061,"meta":5062,"component":5063,"responsiveStyles":5065},"builder-a0865129779944f9a0a5085ec3e42a53",{"previousId":349},{"name":351,"tag":351,"options":5064},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5066},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5068,"small":5069},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5071,"meta":5072,"component":5073,"responsiveStyles":5076},"builder-3126176181834105ba3b98040225ea42",{"previousId":3945},{"name":366,"tag":366,"options":5074},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5075},[],{"large":5077,"small":5078},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5080,"meta":5081,"component":5082,"responsiveStyles":5084},"builder-09279ef945ec4f38bcae6a1c81f95140",{"previousId":3954},{"name":378,"options":5083},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5085,"small":5086},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5088,"@type":106,"tagName":131,"properties":5089,"responsiveStyles":5090},"builder-pixel-kp7ppdaovd",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5091},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5093},{"path":37,"query":5094},{},{},1744205385230,1744205385202,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Feaf353f50eaf4b919eb77c3899251f72",{"folders":5100,"createdDate":5101,"id":3862,"name":5102,"modelId":235,"published":13,"meta":5103,"query":5106,"data":5109,"variations":5206,"lastUpdated":5207,"firstPublished":5208,"testRatio":33,"screenshot":5209,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744201651507,"Resilient Cyber",{"lastPreviewUrl":5104,"breakpoints":5105,"originalContentId":3406,"hasLinks":6,"kind":228,"winningTest":118},"https://app.dev.pushsecurity.com/resources/resilientcyber-031524?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=00d03022cb4c415f9a59699258c8bb53&builder.overrides.00d03022cb4c415f9a59699258c8bb53=00d03022cb4c415f9a59699258c8bb53&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[5107],{"@type":162,"property":163,"operator":164,"value":5108},"/resources/resilientcyber-031524",{"themeId":6,"seoTitle":5110,"seoDescription":5111,"title":5110,"coverImage":5112,"type":1001,"description":5111,"blocks":5113,"url":5108,"state":5203},"Resilient Cyber with Adam Bateman and Chris Hughes","Chris Hughes speaks with Adam Bateman, Co-Founder and CEO of Push Security, about the complexities of securing the modern identity-based security perimeter. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fde59f2aba90b42cbab6d07991079389f",[5114,5183,5191,5198],{"@type":106,"@version":107,"id":3875,"meta":5115,"component":5116,"responsiveStyles":5180},{"previousId":3419},{"name":250,"options":5117},{"columns":5118,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5119,5156],{"blocks":5120,"width":311},[5121,5130,5140],{"@type":106,"@version":107,"id":5122,"meta":5123,"component":5124,"responsiveStyles":5127},"builder-1c1ca87f2d8e486ba7124217d6fa1929",{"previousId":258},{"name":260,"tag":260,"options":5125},{"title":5126,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Resilient Cyber:\u003C/span>\u003C/p>\u003Cp>Securing the Modern Identity Perimeter\u003C/p>",{"large":5128,"small":5129},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5131,"component":5132,"responsiveStyles":5138},"builder-5eaba117d7454dae93ce2d37104dd6f8",{"name":301,"options":5133},{"options":5134},[5135],{"optionTitle":5136,"description":5137},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Resilient Cyber\u003C/span>\u003C/p>","\u003Cp>In this episode, Chris Hughes speaks with Adam Bateman, Co-Founder and CEO of Push Security, about the complexities of securing the modern identity-based security perimeter. They explore current threats facing identity infrastructures, including identity sprawl, SaaS governance, and innovative attack techniques like Okta jacking.\u003C/p>",{"large":5139},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5141,"component":5142,"responsiveStyles":5153},"builder-f562c24c8fe04a2197564dc0112b4c9f",{"name":317,"options":5143},{"hosts":5144},[5145],{"host":5146},{"@type":17,"id":2020,"model":190,"value":5147},{"lastUpdatedBy":34,"folders":5148,"data":5149,"modelId":194,"query":5150,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":5151,"variations":5152,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":5154,"small":5155},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5157,"width":357},[5158,5166,5173],{"@type":106,"@version":107,"id":5159,"meta":5160,"component":5161,"responsiveStyles":5164},"builder-96e2e06084584b8bb8f8ae9035e32cd1",{"previousId":290},{"name":292,"options":5162},{"videoId":5163},"4YJt_KTUV5o",{"large":5165},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5167,"meta":5168,"component":5169,"responsiveStyles":5171},"builder-aeb6639c76824cd598021df8b88988c3",{"previousId":338},{"name":340,"options":5170},{"text":2044},{"large":5172},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5174,"meta":5175,"component":5176,"responsiveStyles":5178},"builder-51c953fb9ff7428da937f03e5663db15",{"previousId":349},{"name":351,"tag":351,"options":5177},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5179},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5181,"small":5182},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":3945,"meta":5184,"component":5185,"responsiveStyles":5188},{"previousId":3489},{"name":366,"tag":366,"options":5186},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5187},[],{"large":5189,"small":5190},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":3954,"meta":5192,"component":5193,"responsiveStyles":5195},{"previousId":3498},{"name":378,"options":5194},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5196,"small":5197},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5199,"@type":106,"tagName":131,"properties":5200,"responsiveStyles":5201},"builder-pixel-6nbocav36bl",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5202},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5204},{"path":37,"query":5205},{},{},1744205070633,1744205070615,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F26031586dbea43e5bfd29c5f16184272",{"folders":5211,"createdDate":5212,"id":5213,"name":5214,"modelId":235,"published":13,"meta":5215,"query":5219,"data":5222,"variations":5325,"lastUpdated":5326,"firstPublished":5327,"testRatio":33,"screenshot":5328,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744197954334,"56d803f132be495f9a520f596a2f5649","Cybersecurity defenders podcast",{"hasLinks":6,"originalContentId":5216,"lastPreviewUrl":5217,"kind":228,"winningTest":118,"breakpoints":5218},"0561c132d12c4ced99ddbeab1e58b8ef","https://app.dev.pushsecurity.com/resources/cybersecuritydefenderspodcast-230124?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=56d803f132be495f9a520f596a2f5649&builder.overrides.56d803f132be495f9a520f596a2f5649=56d803f132be495f9a520f596a2f5649&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[5220],{"@type":162,"property":163,"operator":164,"value":5221},"/resources/cybersecuritydefenderspodcast-230124",{"coverImage":5223,"themeId":6,"seoDescription":5224,"seoTitle":5224,"title":5224,"type":1001,"description":5224,"blocks":5225,"url":5221,"state":5322},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F314d6f132efd4efeba000ff41279389b","Cybersecurity Defenders Podcast w/ Luke Jennings",[5226,5298,5308,5317],{"@type":106,"@version":107,"id":5227,"meta":5228,"component":5230,"responsiveStyles":5295},"builder-7d2a6dc5ac954755b69131e1adad39c3",{"previousId":5229},"builder-53944c4d9acd467db1585918deb9c41e",{"name":250,"options":5231},{"columns":5232,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5233,5271],{"blocks":5234,"width":311},[5235,5244,5254],{"@type":106,"@version":107,"id":5236,"meta":5237,"component":5238,"responsiveStyles":5241},"builder-27a19958465e41e4839a2a116a77a893",{"previousId":258},{"name":260,"tag":260,"options":5239},{"title":5240,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">The Cybersecurity Defenders Podcast:\u003C/span> \u003C/p>\u003Cp>The SaaS cyber kill chain\u003C/p>",{"large":5242,"small":5243},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5245,"component":5246,"responsiveStyles":5252},"builder-0ac3702e0dd640e1a9fffb9603643332",{"name":301,"options":5247},{"options":5248},[5249],{"optionTitle":5250,"description":5251},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Cybersecurity Defenders Podcast\u003C/span>\u003C/p>","\u003Cp>On this episode of The Cybersecurity Defenders Podcast, we have a conversation about the SaaS Cyber Kill Chain with Luke Jennings, VP of Research &amp; Development at Push Security.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>In this interview, we explore the evolution of cyber attacks and the impact of the remote working and SaaS revolution on the cyber kill chain.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>The SaaS Attack Matrix can be found here: https://github.com/pushsecurity/saas-attacks\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",{"large":5253},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5255,"component":5256,"responsiveStyles":5268},"builder-6aaff05be6df465eaf12537bb1a8cbeb",{"name":317,"options":5257},{"hosts":5258},[5259],{"host":5260},{"@type":17,"id":788,"model":190,"value":5261},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":5262,"data":5263,"variations":5264,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":5265,"meta":5266,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":5267,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":5269,"small":5270},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5272,"width":357},[5273,5281,5288],{"@type":106,"@version":107,"id":5274,"meta":5275,"component":5276,"responsiveStyles":5279},"builder-b5ac9b492f0442038aab719713b868b7",{"previousId":290},{"name":292,"options":5277},{"videoId":5278},"OavRu-Vao0U",{"large":5280},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5282,"meta":5283,"component":5284,"responsiveStyles":5286},"builder-1ca4aa7fa7814671a6d22584fe7039e5",{"previousId":338},{"name":340,"options":5285},{"text":813},{"large":5287},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5289,"meta":5290,"component":5291,"responsiveStyles":5293},"builder-04a93a5f17e84a89a5053f91f448cf36",{"previousId":349},{"name":351,"tag":351,"options":5292},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5294},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5296,"small":5297},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5299,"meta":5300,"component":5302,"responsiveStyles":5305},"builder-91db76959eef4861b3698cd2e48cc305",{"previousId":5301},"builder-6cecb302670a4ce9acf59f9dddd9ac6f",{"name":366,"tag":366,"options":5303},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5304},[],{"large":5306,"small":5307},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5309,"meta":5310,"component":5312,"responsiveStyles":5314},"builder-bae2cd85b89040a8ab2b7c7f1cfb0ff5",{"previousId":5311},"builder-a5646a98185947e2995ee4f72604bdd8",{"name":378,"options":5313},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5315,"small":5316},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5318,"@type":106,"tagName":131,"properties":5319,"responsiveStyles":5320},"builder-pixel-nhuhmbcdnl8",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5321},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5323},{"path":37,"query":5324},{},{},1744201596524,1744201596504,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F44d82797d0ae4d79a6f4b4c2d01eb466",{"folders":5330,"createdDate":5331,"id":4877,"name":5332,"modelId":235,"published":13,"meta":5333,"query":5337,"data":5340,"variations":5433,"lastUpdated":5434,"firstPublished":5435,"testRatio":33,"screenshot":5436,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744197443483,"Cyber Ranch 2",{"lastPreviewUrl":5334,"kind":228,"originalContentId":5335,"hasLinks":6,"winningTest":118,"breakpoints":5336},"https://app.dev.pushsecurity.com/resources/cyberranch-112923?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=87ce6bf9ddf44f9ea132b0a245398f3f&builder.overrides.87ce6bf9ddf44f9ea132b0a245398f3f=87ce6bf9ddf44f9ea132b0a245398f3f&builder.options.includeRefs=true&builder.options.enrich=true","2af0f431548743a1b94a0431a5113560",{"small":39,"medium":40},[5338],{"@type":162,"property":163,"operator":164,"value":5339},"/resources/cyberranch-112923",{"type":1001,"themeId":6,"seoTitle":5341,"title":5341,"seoDescription":5342,"description":5342,"coverImage":5343,"blocks":5344,"url":5339,"state":5430},"Luke Jennings appears on the Cyber Ranch Podcast","Push VP R&D Luke Jennings appears on the Cyber Ranch podcast to discuss the SaaS attacks matrix.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8db5346ac1a149d79322b0ea49ee5dc7",[5345,5408,5417,5425],{"@type":106,"@version":107,"id":4890,"meta":5346,"component":5348,"responsiveStyles":5405},{"previousId":5347},"builder-fda8d1f0868d40489431253db49d02fc",{"name":250,"options":5349},{"columns":5350,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5351,5388],{"blocks":5352,"width":311},[5353,5362,5371],{"@type":106,"@version":107,"id":5354,"meta":5355,"component":5356,"responsiveStyles":5359},"builder-f4b9d5576c8d463fb7b9f3369446ee21",{"previousId":258},{"name":260,"tag":260,"options":5357},{"title":5358,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Cyber Ranch Podcast\u003C/span>\u003C/p>\u003Cp>The SaaS attacks matrix\u003C/p>",{"large":5360,"small":5361},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5363,"component":5364,"responsiveStyles":5369},"builder-aade6109317b4bbbadc6f9c6e3eee15b",{"name":301,"options":5365},{"options":5366},[5367],{"optionTitle":4911,"description":5368},"\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push VP R&amp;D Luke Jennings \u003C/span>appears on the Cyber Ranch podcast to discuss the SaaS attacks matrix.\u003C/p>",{"large":5370},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5372,"component":5373,"responsiveStyles":5385},"builder-2eb58f0ffefb422dbbcfe979debe6fcb",{"name":317,"options":5374},{"hosts":5375},[5376],{"host":5377},{"@type":17,"id":788,"model":190,"value":5378},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":5379,"data":5380,"variations":5381,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":5382,"meta":5383,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":5384,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":5386,"small":5387},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5389,"width":357},[5390,5397],{"@type":106,"@version":107,"id":5391,"component":5392,"responsiveStyles":5395},"builder-3f8b0fc30b66430998f188ba36b28ffb",{"name":378,"options":5393},{"image":5394,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":39,"width":39},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F04fcf9985f6743da87d95626395c5faa",{"large":5396},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"@type":106,"@version":107,"id":5398,"meta":5399,"component":5400,"responsiveStyles":5403},"builder-a286b456e1084708b621608a81460a20",{"previousId":349},{"name":351,"tag":351,"options":5401},{"align":267,"size":142,"text":2925,"redirect":5402,"redirectOpenInNewTab":41},"https://thecyberranchpodcast.podbean.com/e/the-saas-attacks-matrix-with-luke-jennings/",{"large":5404},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":5406,"small":5407},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4956,"meta":5409,"component":5411,"responsiveStyles":5414},{"previousId":5410},"builder-30fd36dc3167446f933fb850cdb89e94",{"name":366,"tag":366,"options":5412},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5413},[],{"large":5415,"small":5416},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4966,"meta":5418,"component":5420,"responsiveStyles":5422},{"previousId":5419},"builder-4c4c529008b1463f9e907eb5edc57e74",{"name":378,"options":5421},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5423,"small":5424},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5426,"@type":106,"tagName":131,"properties":5427,"responsiveStyles":5428},"builder-pixel-wwqc164yqjl",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5429},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5431},{"path":37,"query":5432},{},{},1744197647706,1744197581320,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7ff1c882fc8f4d498b5b5fe2036e9866",{"folders":5438,"createdDate":5439,"id":5335,"name":5440,"modelId":235,"published":13,"meta":5441,"query":5445,"data":5447,"variations":5538,"lastUpdated":5539,"firstPublished":5540,"testRatio":33,"screenshot":5541,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744197071277,"Cyber Ranch 1",{"lastPreviewUrl":5442,"hasLinks":6,"originalContentId":5443,"kind":228,"breakpoints":5444,"winningTest":118},"https://app.dev.pushsecurity.com/resources/cyberranch-112923?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=2af0f431548743a1b94a0431a5113560&builder.overrides.2af0f431548743a1b94a0431a5113560=2af0f431548743a1b94a0431a5113560&builder.options.includeRefs=true&builder.options.enrich=true","19973a63c485488e940a58fe8db4c7bf",{"small":39,"medium":40},[5446],{"@type":162,"property":163,"operator":164,"value":5339},{"seoDescription":5448,"seoTitle":5449,"type":1001,"title":5449,"themeId":6,"coverImage":5450,"description":5448,"blocks":5451,"url":5339,"state":5535},"Push CEO & co-founder Adam Bateman appears on the Cyber Ranch podcast to discuss the idea that identity is the new digital perimeter for organizations to defend.","Adam Bateman appears on the Cyber Ranch Podcast","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Febe814eddece41b28ea62046441d35c5",[5452,5513,5522,5530],{"@type":106,"@version":107,"id":5347,"meta":5453,"component":5455,"responsiveStyles":5510},{"previousId":5454},"builder-44d716955c034ffdbe3d4f88db87f523",{"name":250,"options":5456},{"columns":5457,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5458,5494],{"blocks":5459,"width":311},[5460,5469,5478],{"@type":106,"@version":107,"id":5461,"meta":5462,"component":5463,"responsiveStyles":5466},"builder-1d0e223e553c403283dcc225f97c974c",{"previousId":258},{"name":260,"tag":260,"options":5464},{"title":5465,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Cyber Ranch Podcast\u003C/span>\u003C/p>\u003Cp>Identity as the Perimeter\u003C/p>",{"large":5467,"small":5468},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5470,"component":5471,"responsiveStyles":5476},"builder-7bf69481bada4d7ebd313204d8bc19e8",{"name":301,"options":5472},{"options":5473},[5474],{"optionTitle":4911,"description":5475},"\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder \u003C/span>Adam Bateman appears on the Cyber Ranch podcast to discuss the idea that identity is the new digital perimeter for organizations to defend.\u003C/p>",{"large":5477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5479,"component":5480,"responsiveStyles":5491},"builder-aeebc3c8678f4a2dad80c32f38a07d1a",{"name":317,"options":5481},{"hosts":5482},[5483],{"host":5484},{"@type":17,"id":2020,"model":190,"value":5485},{"lastUpdatedBy":34,"folders":5486,"data":5487,"modelId":194,"query":5488,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":5489,"variations":5490,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":5492,"small":5493},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5495,"width":357},[5496,5502],{"@type":106,"@version":107,"id":5497,"component":5498,"responsiveStyles":5500},"builder-ee2becbf8d504030b16357fd9c7d3a11",{"name":378,"options":5499},{"image":5394,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":39,"width":39},{"large":5501},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"@type":106,"@version":107,"id":5503,"meta":5504,"component":5505,"responsiveStyles":5508},"builder-a87e9e1ff451424d9e83e5e105db7a74",{"previousId":349},{"name":351,"tag":351,"options":5506},{"align":267,"size":142,"text":2925,"redirect":5507,"redirectOpenInNewTab":41},"https://thecyberranchpodcast.podbean.com/e/identity-as-perimeter-with-adam-bateman/",{"large":5509},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":5511,"small":5512},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5410,"meta":5514,"component":5516,"responsiveStyles":5519},{"previousId":5515},"builder-6f44d6513111479fbde270fcaf576e06",{"name":366,"tag":366,"options":5517},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5518},[],{"large":5520,"small":5521},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5419,"meta":5523,"component":5525,"responsiveStyles":5527},{"previousId":5524},"builder-374c3bc1493f4d04a86d1f1b61c30436",{"name":378,"options":5526},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5528,"small":5529},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5531,"@type":106,"tagName":131,"properties":5532,"responsiveStyles":5533},"builder-pixel-8okre1ry3fx",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5534},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5536},{"path":37,"query":5537},{},{},1744197626173,1744197434003,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F216aa47d7be74fcdb81ab48627442369",{"folders":5543,"createdDate":5544,"id":5545,"name":5546,"modelId":235,"published":13,"query":5547,"data":5550,"variations":5651,"lastUpdated":5652,"firstPublished":5653,"testRatio":33,"screenshot":5654,"createdBy":34,"lastUpdatedBy":72,"meta":5655,"rev":408},[],1737048755684,"1183c27eb2d2457ab327b203717976c0","On-demand Webinar: Understanding the New SaaS Cyber Kill Chain",[5548],{"@type":162,"property":163,"operator":164,"value":5549},"/resources/understanding-the-new-saas-cyber-kill-chain",{"description":5551,"seoTitle":5552,"title":5552,"type":243,"themeId":6,"coverImage":5553,"seoDescription":5551,"blocks":5554,"url":5549,"state":5648},"What the new SaaS cyber kill chain looks like for modern organizations that are fully SaaS native without any concept of an internal network","Understanding the New SaaS Cyber Kill Chain","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3c9565cf4dfa48c49b666d5e5cb2c3e4",[5555,5626,5635,5643],{"@type":106,"@version":107,"id":5556,"meta":5557,"component":5558,"responsiveStyles":5623},"builder-c7ce42a42e1e476dacdf11c0e07a86e3",{"previousId":2621},{"name":250,"options":5559},{"columns":5560,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5561,5599],{"blocks":5562,"width":311},[5563,5572,5582],{"@type":106,"@version":107,"id":5564,"meta":5565,"component":5566,"responsiveStyles":5569},"builder-76e3ffad6cdc4570a44a1c4db6638425",{"previousId":258},{"name":260,"tag":260,"options":5567},{"title":5568,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">SaaS attacks:\u003C/span> Understanding the new SaaS cyber kill chain\u003C/p>",{"large":5570,"small":5571},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5573,"component":5574,"responsiveStyles":5580},"builder-d5793a1f41d3428cbe832689abba5fa0",{"name":301,"options":5575},{"options":5576},[5577],{"optionTitle":5578,"description":5579},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> SaaS attacks\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">This talk will consider what the new SaaS cyber kill chain looks like for modern organizations that are fully SaaS native without any concept of an internal network, and the surprising number of attacks that are possible without touching company owned endpoints or infrastructure.&nbsp;\u003C/span>\u003C/p>",{"large":5581},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5583,"component":5584,"responsiveStyles":5596},"builder-3aa5650433fd4710b10f90ce19e0ad74",{"name":317,"options":5585},{"hosts":5586},[5587],{"host":5588},{"@type":17,"id":788,"model":190,"value":5589},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":5590,"data":5591,"variations":5592,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":5593,"meta":5594,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":5595,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":5597,"small":5598},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5600,"width":357},[5601,5609,5616],{"@type":106,"@version":107,"id":5602,"meta":5603,"component":5604,"responsiveStyles":5607},"builder-22d39c1f0dda4bf68e4cc3108b1d5495",{"previousId":290},{"name":292,"options":5605},{"videoId":5606},"cJKtREGhjE8",{"large":5608},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5610,"meta":5611,"component":5612,"responsiveStyles":5614},"builder-74fac4dbc2944a2ebaa3be8d8cb48a71",{"previousId":338},{"name":340,"options":5613},{"text":813},{"large":5615},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5617,"meta":5618,"component":5619,"responsiveStyles":5621},"builder-f852b2372d3640a68c485b5ef4db389e",{"previousId":349},{"name":351,"tag":351,"options":5620},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5622},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5624,"small":5625},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5627,"meta":5628,"component":5629,"responsiveStyles":5632},"builder-05977f8268f54d578f411eb15b770ad2",{"previousId":2703},{"name":366,"tag":366,"options":5630},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5631},[],{"large":5633,"small":5634},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5636,"meta":5637,"component":5638,"responsiveStyles":5640},"builder-1e05518fe66a47ad8bcdfd6c76cd6bd7",{"previousId":2712},{"name":378,"options":5639},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5641,"small":5642},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5644,"@type":106,"tagName":131,"properties":5645,"responsiveStyles":5646},"builder-pixel-zxhecp3eiyo",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5647},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5649},{"path":37,"query":5650},{},{},1742400205089,1737104654575,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7d94188b7ead4925b34f7b84cf290278",{"lastPreviewUrl":5656,"kind":228,"winningTest":118,"originalContentId":5216,"breakpoints":5657,"hasLinks":6,"hasAutosaves":41},"https://app.dev.pushsecurity.com/resources/understanding-the-new-saas-cyber-kill-chain?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=1183c27eb2d2457ab327b203717976c0&builder.overrides.1183c27eb2d2457ab327b203717976c0=1183c27eb2d2457ab327b203717976c0",{"small":39,"medium":40},{"folders":5659,"createdDate":5660,"id":5216,"name":5661,"modelId":235,"published":13,"meta":5662,"query":5666,"data":5669,"variations":5765,"lastUpdated":5766,"firstPublished":5767,"testRatio":33,"screenshot":5768,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737048479619,"Shared Security - Compromising an Organization without Touching the Network",{"hasLinks":6,"kind":228,"winningTest":118,"lastPreviewUrl":5663,"originalContentId":5664,"breakpoints":5665},"https://app.dev.pushsecurity.com/resources/compromising-an-org-without-touching-the-network?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=0561c132d12c4ced99ddbeab1e58b8ef&builder.overrides.0561c132d12c4ced99ddbeab1e58b8ef=0561c132d12c4ced99ddbeab1e58b8ef","54349bdb64664c2abe9832679abb68e7",{"small":39,"medium":40},[5667],{"@type":162,"property":163,"operator":164,"value":5668},"/resources/compromising-an-org-without-touching-the-network",{"coverImage":5670,"description":5661,"themeId":6,"type":1001,"title":5661,"seoDescription":5661,"seoTitle":5661,"blocks":5671,"url":5668,"state":5762},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe3180c6fb8504692935826fe3233d0c8",[5672,5742,5750,5757],{"@type":106,"@version":107,"id":5229,"meta":5673,"component":5674,"responsiveStyles":5739},{"previousId":2621},{"name":250,"options":5675},{"columns":5676,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5677,5715],{"blocks":5678,"width":311},[5679,5688,5698],{"@type":106,"@version":107,"id":5680,"meta":5681,"component":5682,"responsiveStyles":5685},"builder-2c561c2180f24c3e9e87deca4f66c1c3",{"previousId":258},{"name":260,"tag":260,"options":5683},{"title":5684,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Shared Security:\u003C/span> Compromizing an organization without touching the endpoint\u003C/p>",{"large":5686,"small":5687},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5689,"component":5690,"responsiveStyles":5696},"builder-9de59d02ece74b3693a17d387b4183ae",{"name":301,"options":5691},{"options":5692},[5693],{"optionTitle":5694,"description":5695},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Shared Security Podcast\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">In this episode of Shared Security Luke Jennings VP of Research &amp; Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint or network.\u003C/span>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cspan style=\"font-size: 18px;\">﻿Luke talks about his recent SaaS attack research, why SaaS based attacks are different than traditional network based attacks, the SaaS attack matrix which can be used by both red and blue teams, and why its important that this research is shared and talked about in the cybersecurity community.\u003C/span>\u003C/p>",{"large":5697},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5699,"component":5700,"responsiveStyles":5712},"builder-9b25b70b9a5e4522a3c1d07cdb62b76f",{"name":317,"options":5701},{"hosts":5702},[5703],{"host":5704},{"@type":17,"id":788,"model":190,"value":5705},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":5706,"data":5707,"variations":5708,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":5709,"meta":5710,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":5711,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":5713,"small":5714},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5716,"width":357},[5717,5725,5732],{"@type":106,"@version":107,"id":5718,"meta":5719,"component":5720,"responsiveStyles":5723},"builder-bd101d13c82b48a89365563011163859",{"previousId":290},{"name":292,"options":5721},{"videoId":5722},"Rj0t5Lw12Ic",{"large":5724},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5726,"meta":5727,"component":5728,"responsiveStyles":5730},"builder-5ccaafa90b0a4aa5addcb68d9e788ab8",{"previousId":338},{"name":340,"options":5729},{"text":813},{"large":5731},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5733,"meta":5734,"component":5735,"responsiveStyles":5737},"builder-57ecf736438a47eaa02e6041e5b360b9",{"previousId":349},{"name":351,"tag":351,"options":5736},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5738},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5740,"small":5741},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5301,"meta":5743,"component":5744,"responsiveStyles":5747},{"previousId":2703},{"name":366,"tag":366,"options":5745},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5746},[],{"large":5748,"small":5749},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5311,"meta":5751,"component":5752,"responsiveStyles":5754},{"previousId":2712},{"name":378,"options":5753},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5755,"small":5756},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5758,"@type":106,"tagName":131,"properties":5759,"responsiveStyles":5760},"builder-pixel-hodw6891ngf",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5761},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5763},{"path":37,"query":5764},{},{},1742400181842,1737104554765,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa07ed8333bd64509a0aed1184fa46741",{"folders":5770,"createdDate":5771,"id":5664,"name":5772,"modelId":235,"published":13,"meta":5773,"query":5776,"data":5779,"variations":5879,"lastUpdated":5880,"firstPublished":5881,"testRatio":33,"screenshot":5882,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737048356086,"BlueHat 2023 - SaaS Cyber Kill Chain",{"originalContentId":3290,"kind":228,"breakpoints":5774,"winningTest":118,"hasLinks":6,"lastPreviewUrl":5775},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/bluehat-2023-saas-cyber-kill-chain?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=54349bdb64664c2abe9832679abb68e7&builder.overrides.54349bdb64664c2abe9832679abb68e7=54349bdb64664c2abe9832679abb68e7",[5777],{"@type":162,"property":163,"operator":164,"value":5778},"/resources/bluehat-2023-saas-cyber-kill-chain",{"seoDescription":5780,"seoTitle":5772,"themeId":6,"coverImage":5781,"description":5780,"type":4215,"title":5772,"blocks":5782,"url":5778,"state":5876},"Luke Jennings speaks about the SaaS cyber kill chain at BlueHat 2023","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff2547e7b7f16459385320740edbddd96",[5783,5854,5863,5871],{"@type":106,"@version":107,"id":5784,"meta":5785,"component":5786,"responsiveStyles":5851},"builder-0f87b51179044fb2a26f367f5450af72",{"previousId":2621},{"name":250,"options":5787},{"columns":5788,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5789,5827],{"blocks":5790,"width":311},[5791,5800,5810],{"@type":106,"@version":107,"id":5792,"meta":5793,"component":5794,"responsiveStyles":5797},"builder-f64d499afbe04ab9b779008c41e5374d",{"previousId":258},{"name":260,"tag":260,"options":5795},{"title":5796,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">BlueHat 2023:\u003C/span> The SaaS cyber kill chain\u003C/p>",{"large":5798,"small":5799},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5801,"component":5802,"responsiveStyles":5808},"builder-f43cc420745742c899dd8e45cb86532b",{"name":301,"options":5803},{"options":5804},[5805],{"optionTitle":5806,"description":5807},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> The SaaS cyber kill chain\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Luke Jennings, Push's VP of R&amp;D, explores the evolution of cyber attacks and the impact of the remote working and SaaS revolution on the cyber kill chain.\u003C/span>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cspan class=\"ql-cursor\">﻿\u003C/span>He discusses the new SaaS cyber kill chain for modern, fully SaaS native organizations and the surprising number of attacks possible without touching company-owned endpoints or infrastructure.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Luke discusses how initial access, lateral movement, and persistence methods have changed in a world with no internal infrastructure. He also introduces the open-source SaaS attacks matrix as a tool for both red and blue teams navigating this new landscape.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",{"large":5809},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5811,"component":5812,"responsiveStyles":5824},"builder-3fc097a854f34aad8ef9d2ed0acc4963",{"name":317,"options":5813},{"hosts":5814},[5815],{"host":5816},{"@type":17,"id":788,"model":190,"value":5817},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":5818,"data":5819,"variations":5820,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":5821,"meta":5822,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":5823,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":5825,"small":5826},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5828,"width":357},[5829,5837,5844],{"@type":106,"@version":107,"id":5830,"meta":5831,"component":5832,"responsiveStyles":5835},"builder-84b045a315134de7b09016c4e1711d8d",{"previousId":290},{"name":292,"options":5833},{"videoId":5834},"pdDzUTFVIZc",{"large":5836},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":5838,"meta":5839,"component":5840,"responsiveStyles":5842},"builder-b7fd63996258491b89c875dcd9bb0d4b",{"previousId":338},{"name":340,"options":5841},{"text":813},{"large":5843},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":5845,"meta":5846,"component":5847,"responsiveStyles":5849},"builder-7605d2f07ca84a778c173fa592ed55c1",{"previousId":349},{"name":351,"tag":351,"options":5848},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":5850},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":5852,"small":5853},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5855,"meta":5856,"component":5857,"responsiveStyles":5860},"builder-eb8b720bffdd48beb37a12472767fea7",{"previousId":2703},{"name":366,"tag":366,"options":5858},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5859},[],{"large":5861,"small":5862},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5864,"meta":5865,"component":5866,"responsiveStyles":5868},"builder-4226f51ca66948c387e6a28e234b5916",{"previousId":2712},{"name":378,"options":5867},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5869,"small":5870},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5872,"@type":106,"tagName":131,"properties":5873,"responsiveStyles":5874},"builder-pixel-95d4slkg4fj",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5875},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5877},{"path":37,"query":5878},{},{},1742307565781,1737104497243,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b29e61b39154f94974d7967ea656306",{"folders":5884,"createdDate":5885,"id":5443,"name":5886,"modelId":235,"published":13,"meta":5887,"query":5891,"data":5894,"variations":5988,"lastUpdated":5989,"firstPublished":5990,"testRatio":33,"screenshot":5991,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744196815749,"CyberWire Daily 2",{"hasLinks":6,"lastPreviewUrl":5888,"winningTest":118,"originalContentId":5889,"breakpoints":5890,"kind":228},"https://app.dev.pushsecurity.com/resources/cyberwiredaily-151123?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=19973a63c485488e940a58fe8db4c7bf&builder.overrides.19973a63c485488e940a58fe8db4c7bf=19973a63c485488e940a58fe8db4c7bf&builder.options.includeRefs=true&builder.options.enrich=true","8fdae8bd36984e7984609094d61b2e84",{"small":39,"medium":40},[5892],{"@type":162,"property":163,"operator":164,"value":5893},"/resources/cyberwiredaily-151123",{"seoTitle":5895,"seoDescription":5896,"coverImage":5897,"themeId":6,"title":5895,"description":5896,"type":1001,"blocks":5898,"url":5893,"state":5985},"Adam Bateman appears on CyberWire Daily","Push CEO & co-founder Adam Bateman appears on CyberWire Daily to discuss attackers targeting cloud identities in the wild.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2b19f6cc9ce342b2884e100e2b1f64e3",[5899,5963,5972,5980],{"@type":106,"@version":107,"id":5454,"meta":5900,"component":5902,"responsiveStyles":5960},{"previousId":5901},"builder-7616357b0ed444f9a5d1c301db06ba87",{"name":250,"options":5903},{"columns":5904,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[5905,5942],{"blocks":5906,"width":311},[5907,5916,5926],{"@type":106,"@version":107,"id":5908,"meta":5909,"component":5910,"responsiveStyles":5913},"builder-202fc203b8ee4053892ee28a9ca49495",{"previousId":258},{"name":260,"tag":260,"options":5911},{"title":5912,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">CyberWire Daily\u003C/span>\u003C/p>\u003Cp>Cloud identity attacks\u003C/p>",{"large":5914,"small":5915},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":5917,"component":5918,"responsiveStyles":5924},"builder-21a402205cc34a7b87349c911e98aca5",{"name":301,"options":5919},{"options":5920},[5921],{"optionTitle":5922,"description":5923},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> CyberWire Daily\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder \u003C/span>Adam Bateman appears on CyberWire Daily to discuss attackers targeting cloud identities in the wild.\u003C/p>",{"large":5925},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":5927,"component":5928,"responsiveStyles":5939},"builder-efeb19d8e0164250ba27ba5d05ee5b3d",{"name":317,"options":5929},{"hosts":5930},[5931],{"host":5932},{"@type":17,"id":2020,"model":190,"value":5933},{"lastUpdatedBy":34,"folders":5934,"data":5935,"modelId":194,"query":5936,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":5937,"variations":5938,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":5940,"small":5941},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":5943,"width":357},[5944,5952],{"@type":106,"@version":107,"id":5945,"component":5946,"responsiveStyles":5950},"builder-debdf0c483604418a5cf6884fbad2617",{"name":378,"options":5947},{"image":5948,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":5949,"width":5949},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b8409101dd64c4ea14af860063a9417",368,{"large":5951},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":5953,"meta":5954,"component":5955,"responsiveStyles":5958},"builder-6935a514c8e14ef9a8c6fc2ecf5b9f85",{"previousId":349},{"name":351,"tag":351,"options":5956},{"align":267,"size":142,"text":2925,"redirect":5957,"redirectOpenInNewTab":41},"https://playlist.megaphone.fm/?e=CYBW9515051931&start=894",{"large":5959},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":5961,"small":5962},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5515,"meta":5964,"component":5966,"responsiveStyles":5969},{"previousId":5965},"builder-a0c3339b21e94fddb814e7f0377b6915",{"name":366,"tag":366,"options":5967},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":5968},[],{"large":5970,"small":5971},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5524,"meta":5973,"component":5975,"responsiveStyles":5977},{"previousId":5974},"builder-abb979b13e4245d5a93c6fd9e1ca726d",{"name":378,"options":5976},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":5978,"small":5979},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":5981,"@type":106,"tagName":131,"properties":5982,"responsiveStyles":5983},"builder-pixel-rsnfoa7m46",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":5984},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":5986},{"path":37,"query":5987},{},{},1744196998020,1744196997995,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdd6d89b5bdb8457a8091b8a348c3609d",{"folders":5993,"createdDate":5994,"id":5995,"name":5996,"modelId":235,"published":13,"meta":5997,"query":6000,"data":6003,"variations":6101,"lastUpdated":6102,"firstPublished":6103,"testRatio":33,"screenshot":6104,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744196198087,"6e1e717db9a14ce890c0ae242c75b0a5","DCP Podcast",{"kind":228,"lastPreviewUrl":5998,"originalContentId":5216,"hasLinks":41,"breakpoints":5999,"winningTest":118},"https://app.dev.pushsecurity.com/resources/dcppodcast-111323?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=6e1e717db9a14ce890c0ae242c75b0a5&builder.overrides.6e1e717db9a14ce890c0ae242c75b0a5=6e1e717db9a14ce890c0ae242c75b0a5&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[6001],{"@type":162,"property":163,"operator":164,"value":6002},"/resources/dcppodcast-111323",{"type":1001,"seoTitle":6004,"seoDescription":6005,"coverImage":6006,"description":6005,"title":6004,"themeId":6,"blocks":6007,"url":6002,"state":6098},"DCP Podcast Episode 35: Luke Jennings","Luke Jennings of Push Security joins the DCP podcasters to talk all things SaaS.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F618b36a562894902a94ed24c425d2f67",[6008,6076,6085,6093],{"@type":106,"@version":107,"id":6009,"meta":6010,"component":6011,"responsiveStyles":6073},"builder-8f3daaaa0a2d4668b852d8487abbeae4",{"previousId":5229},{"name":250,"options":6012},{"columns":6013,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6014,6052],{"blocks":6015,"width":311},[6016,6025,6035],{"@type":106,"@version":107,"id":6017,"meta":6018,"component":6019,"responsiveStyles":6022},"builder-3965d7c01ad24fbeb9da2e1d0d80aabb",{"previousId":258},{"name":260,"tag":260,"options":6020},{"title":6021,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">DCP Podcast:\u003C/span> SaaS attacks with Luke Jennings\u003C/p>",{"large":6023,"small":6024},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6026,"component":6027,"responsiveStyles":6033},"builder-cf9b8825434b4e19a156f741755a84e9",{"name":301,"options":6028},{"options":6029},[6030],{"optionTitle":6031,"description":6032},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> DCP Podcast\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 14px;\">Luke Jennings of Push Security joins the DCP podcasters to talk all things SaaS.\u003C/span>\u003C/p>",{"large":6034},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6036,"component":6037,"responsiveStyles":6049},"builder-0bb9a91c29f944309217be4a6b556eb5",{"name":317,"options":6038},{"hosts":6039},[6040],{"host":6041},{"@type":17,"id":788,"model":190,"value":6042},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":6043,"data":6044,"variations":6045,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":6046,"meta":6047,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":6048,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":6050,"small":6051},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6053,"width":357},[6054,6061],{"@type":106,"@version":107,"id":6055,"component":6056,"responsiveStyles":6059},"builder-baac1fbca6664b5f83c95f9395394954",{"name":378,"options":6057},{"image":6058,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":39,"width":39},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa98653f83e244536a0e5b20bc9d4ebc3",{"large":6060},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139},{"@type":106,"@version":107,"tagName":6062,"id":6063,"properties":6064,"linkUrl":6065,"meta":6066,"component":6067,"responsiveStyles":6070},"a","builder-5ac42e81d1144707b7affa24057960db",{"href":6065},"https://www.youtube.com/watch?v=NAOE875gAOg",{"previousId":349},{"name":351,"tag":351,"options":6068},{"align":267,"size":142,"text":6069,"redirect":354,"redirectOpenInNewTab":41},"Watch Here",{"large":6071},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310,"cursor":6072},"pointer",{"large":6074,"small":6075},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":6077,"meta":6078,"component":6079,"responsiveStyles":6082},"builder-67c79d30ddfb468cac2beb95175c38ba",{"previousId":5301},{"name":366,"tag":366,"options":6080},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6081},[],{"large":6083,"small":6084},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":6086,"meta":6087,"component":6088,"responsiveStyles":6090},"builder-211ca1f3f8c04e73afb735d7b80d2ef0",{"previousId":5311},{"name":378,"options":6089},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":6091,"small":6092},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6094,"@type":106,"tagName":131,"properties":6095,"responsiveStyles":6096},"builder-pixel-8wj19tllemm",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6097},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6099},{"path":37,"query":6100},{},{},1744196738124,1744196723669,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa2494680210e4cb4aee50b4f7ef45bfb",{"folders":6106,"createdDate":6107,"id":4655,"name":6108,"modelId":235,"published":13,"meta":6109,"query":6112,"data":6114,"variations":6201,"lastUpdated":6202,"firstPublished":6203,"testRatio":33,"screenshot":6204,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744195389626,"Risky Business 722",{"originalContentId":5889,"hasLinks":6,"winningTest":118,"lastPreviewUrl":6110,"kind":228,"breakpoints":6111},"https://app.dev.pushsecurity.com/resources/riskybusiness-151123?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=b6b4aa2bfee14f79aa597a8b80a94d57&builder.overrides.b6b4aa2bfee14f79aa597a8b80a94d57=b6b4aa2bfee14f79aa597a8b80a94d57&builder.options.includeRefs=true&builder.options.enrich=true",{"small":39,"medium":40},[6113],{"@type":162,"property":163,"operator":164,"value":4658},{"type":1001,"seoTitle":4660,"themeId":6,"title":4660,"description":6115,"coverImage":6116,"seoDescription":6115,"blocks":6117,"url":4658,"state":6198},"Push CEO & co-founder Adam Bateman appears on the Risky Business podcast to discuss Push's SaaS attacks research","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6f6a340db8734d0b98543213d30185eb",[6118,6178,6186,6193],{"@type":106,"@version":107,"id":4666,"meta":6119,"component":6120,"responsiveStyles":6175},{"previousId":5901},{"name":250,"options":6121},{"columns":6122,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6123,6159],{"blocks":6124,"width":311},[6125,6134,6143],{"@type":106,"@version":107,"id":6126,"meta":6127,"component":6128,"responsiveStyles":6131},"builder-df75413a22b24e26b9eadcd8a48118d5",{"previousId":258},{"name":260,"tag":260,"options":6129},{"title":6130,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">Risky Business:\u003C/span>\u003C/p>\u003Cp>Episode #722\u003C/p>",{"large":6132,"small":6133},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6135,"component":6136,"responsiveStyles":6141},"builder-22358cb3dbaa409c8f108b06072a5f0d",{"name":301,"options":6137},{"options":6138},[6139],{"optionTitle":3556,"description":6140},"\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder \u003C/span>Adam Bateman appears on the Risky Business podcast to discuss Push's SaaS attacks research\u003C/p>",{"large":6142},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6144,"component":6145,"responsiveStyles":6156},"builder-efbdb1eaaef149d6bbb7a4b52813c0af",{"name":317,"options":6146},{"hosts":6147},[6148],{"host":6149},{"@type":17,"id":2020,"model":190,"value":6150},{"lastUpdatedBy":34,"folders":6151,"data":6152,"modelId":194,"query":6153,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":6154,"variations":6155,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":6157,"small":6158},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6160,"width":357},[6161,6167],{"@type":106,"@version":107,"id":6162,"component":6163,"responsiveStyles":6165},"builder-b5fab37463f84bafb3559b04f155c753",{"name":378,"options":6164},{"image":3583,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":3584,"width":3584},{"large":6166},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":6168,"meta":6169,"component":6170,"responsiveStyles":6173},"builder-46538014b45641c19b7ae120f80b5cad",{"previousId":349},{"name":351,"tag":351,"options":6171},{"align":267,"size":142,"text":2925,"redirect":6172,"redirectOpenInNewTab":41},"https://risky.biz/RB722/",{"large":6174},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":6176,"small":6177},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4727,"meta":6179,"component":6180,"responsiveStyles":6183},{"previousId":5965},{"name":366,"tag":366,"options":6181},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6182},[],{"large":6184,"small":6185},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4736,"meta":6187,"component":6188,"responsiveStyles":6190},{"previousId":5974},{"name":378,"options":6189},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":6191,"small":6192},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6194,"@type":106,"tagName":131,"properties":6195,"responsiveStyles":6196},"builder-pixel-o301s8k4k4",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6197},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6199},{"path":37,"query":6200},{},{},1744196127240,1744196105220,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fcb3966eda7e145aa8aea7e684936ef32",{"folders":6206,"createdDate":6207,"id":5889,"name":6208,"modelId":235,"published":13,"meta":6209,"query":6212,"data":6215,"variations":6303,"lastUpdated":6304,"firstPublished":6305,"testRatio":33,"screenshot":6306,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744194219935,"CyberWire Daily",{"originalContentId":4540,"hasLinks":6,"winningTest":118,"kind":228,"breakpoints":6210,"lastPreviewUrl":6211},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/cyberwiredaily-091323?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=8fdae8bd36984e7984609094d61b2e84&builder.overrides.8fdae8bd36984e7984609094d61b2e84=8fdae8bd36984e7984609094d61b2e84&builder.options.includeRefs=true&builder.options.enrich=true",[6213],{"@type":162,"property":163,"operator":164,"value":6214},"/resources/cyberwiredaily-091323",{"themeId":6,"description":6216,"seoDescription":6216,"coverImage":6217,"title":6218,"seoTitle":6218,"type":1001,"blocks":6219,"url":6214,"state":6300},"Push CEO & co-founder Adam Bateman appeared on the CISO Series podcast to discuss managing stress in the heat of a cyber incident.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fce655293037e49c883a5177ed13fb178","Adam Bateman appears on CyberWire Daily to discuss shadow identities and the risks they introduce.",[6220,6280,6288,6295],{"@type":106,"@version":107,"id":5901,"meta":6221,"component":6222,"responsiveStyles":6277},{"previousId":4553},{"name":250,"options":6223},{"columns":6224,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6225,6261],{"blocks":6226,"width":311},[6227,6236,6245],{"@type":106,"@version":107,"id":6228,"meta":6229,"component":6230,"responsiveStyles":6233},"builder-7671e74772504c3eaa411e74de17b305",{"previousId":258},{"name":260,"tag":260,"options":6231},{"title":6232,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">CyberWire Daily\u003C/span>\u003C/p>\u003Cp>Shadow Identities\u003C/p>",{"large":6234,"small":6235},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6237,"component":6238,"responsiveStyles":6243},"builder-3b5ebcc80bb749f4adb31a3e3ef24a27",{"name":301,"options":6239},{"options":6240},[6241],{"optionTitle":5922,"description":6242},"\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder \u003C/span>Adam Bateman appears on CyberWire Daily to discuss shadow identities and the risks they introduce.\u003C/p>",{"large":6244},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6246,"component":6247,"responsiveStyles":6258},"builder-360b4e51a72b413f8e985d87cde48dee",{"name":317,"options":6248},{"hosts":6249},[6250],{"host":6251},{"@type":17,"id":2020,"model":190,"value":6252},{"lastUpdatedBy":34,"folders":6253,"data":6254,"modelId":194,"query":6255,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":6256,"variations":6257,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":6259,"small":6260},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6262,"width":357},[6263,6269],{"@type":106,"@version":107,"id":6264,"component":6265,"responsiveStyles":6267},"builder-3d60f987b4c3405caeecb59dc8ce7761",{"name":378,"options":6266},{"image":5948,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":33,"lockAspectRatio":6,"height":5949,"width":5949},{"large":6268},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":6270,"meta":6271,"component":6272,"responsiveStyles":6275},"builder-8c4e1434f9804c59a8f177bbd5bab373",{"previousId":349},{"name":351,"tag":351,"options":6273},{"align":267,"size":142,"text":2925,"redirect":6274,"redirectOpenInNewTab":41},"https://playlist.megaphone.fm/?e=CYBW7193624450&start=760https://cisoseries.com/how-security-leaders-deal-with-intense-stress/",{"large":6276},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":6278,"small":6279},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":5965,"meta":6281,"component":6282,"responsiveStyles":6285},{"previousId":4620},{"name":366,"tag":366,"options":6283},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6284},[],{"large":6286,"small":6287},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":5974,"meta":6289,"component":6290,"responsiveStyles":6292},{"previousId":4630},{"name":378,"options":6291},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":6293,"small":6294},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6296,"@type":106,"tagName":131,"properties":6297,"responsiveStyles":6298},"builder-pixel-kj50fbhe3vf",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6299},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6301},{"path":37,"query":6302},{},{},1744195351424,1744195323806,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb82962f4fa7440f699f92394338030e1",{"folders":6308,"createdDate":6309,"id":4540,"name":6310,"modelId":235,"published":13,"meta":6311,"query":6314,"data":6317,"variations":6405,"lastUpdated":6406,"firstPublished":6407,"testRatio":33,"screenshot":6408,"createdBy":34,"lastUpdatedBy":34,"rev":408},[],1744193818480,"CISO Series — How security leaders deal with intense stress",{"lastPreviewUrl":6312,"originalContentId":3406,"kind":228,"winningTest":118,"breakpoints":6313,"hasLinks":6},"https://pushsecurity.com/resources/ciso-series-083123?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2Cadmin%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Admin&builder.user.role.id=admin&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=d1c02ad09b034f48853cd26243ce5c9e&builder.overrides.d1c02ad09b034f48853cd26243ce5c9e=d1c02ad09b034f48853cd26243ce5c9e&builder.options.includeRefs=true&builder.options.enrich=true",{"xsmall":57,"small":39,"medium":40},[6315],{"@type":162,"property":163,"operator":164,"value":6316},"/resources/ciso-series-083123",{"title":4548,"seoTitle":6318,"themeId":6,"description":6216,"coverImage":6319,"type":1001,"seoDescription":6216,"blocks":6320,"url":6316,"state":6402},"CISO Series: How Security Leaders Deal with Intense Stress","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc7a428dc2744460fa2a3a1fd1b5b3890",[6321,6382,6390,6397],{"@type":106,"@version":107,"id":4553,"meta":6322,"component":6323,"responsiveStyles":6379},{"previousId":3419},{"name":250,"options":6324},{"columns":6325,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6326,6362],{"blocks":6327,"width":311},[6328,6337,6346],{"@type":106,"@version":107,"id":6329,"meta":6330,"component":6331,"responsiveStyles":6334},"builder-5ea588f116b84fa0befe19132fb1c8d1",{"previousId":258},{"name":260,"tag":260,"options":6332},{"title":6333,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">CISO Series\u003C/span>\u003C/p>\u003Cp>How Security Leaders Deal with Intense Stress\u003C/p>",{"large":6335,"small":6336},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6338,"component":6339,"responsiveStyles":6344},"builder-ffb6d2af2db948b99ebefab4d9c34633",{"name":301,"options":6340},{"options":6341},[6342],{"optionTitle":4574,"description":6343},"\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder Adam Bateman appeared on the CISO Series podcast to discuss managing stress in the heat of a cyber incident.\u003C/span>\u003C/p>",{"large":6345},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6347,"component":6348,"responsiveStyles":6359},"builder-3fc4515620c84f12916b3ac7f40dad50",{"name":317,"options":6349},{"hosts":6350},[6351],{"host":6352},{"@type":17,"id":2020,"model":190,"value":6353},{"lastUpdatedBy":34,"folders":6354,"data":6355,"modelId":194,"query":6356,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":6357,"variations":6358,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":6360,"small":6361},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6363,"width":357},[6364,6371],{"@type":106,"@version":107,"id":6365,"component":6366,"responsiveStyles":6369},"builder-f2ef601339944bda8aab5793e0526af1",{"name":378,"options":6367},{"image":6368,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":4601,"lockAspectRatio":6,"height":4602,"width":430,"sizes":4603},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Faafc6ee2c5d64b1d88e234cf73309b0a?format=webp&width=574",{"large":6370},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginLeft":345,"marginRight":345},{"@type":106,"@version":107,"id":6372,"meta":6373,"component":6374,"responsiveStyles":6377},"builder-ab2ee5b584964e87a6965ea3544e58fa",{"previousId":349},{"name":351,"tag":351,"options":6375},{"align":267,"size":142,"text":2925,"redirect":6376,"redirectOpenInNewTab":41},"https://cisoseries.com/how-security-leaders-deal-with-intense-stress/",{"large":6378},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345,"marginTop":310},{"large":6380,"small":6381},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":4620,"meta":6383,"component":6384,"responsiveStyles":6387},{"previousId":3489},{"name":366,"tag":366,"options":6385},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6386},[],{"large":6388,"small":6389},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":4630,"meta":6391,"component":6392,"responsiveStyles":6394},{"previousId":3498},{"name":378,"options":6393},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":970},{"large":6395,"small":6396},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6398,"@type":106,"tagName":131,"properties":6399,"responsiveStyles":6400},"builder-pixel-oa4sv22cpw9",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6401},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6403},{"path":37,"query":6404},{},{},1745572910793,1744194199671,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0ea176a6e7594c05bf3347bb753975ab",{"folders":6410,"createdDate":6411,"id":6412,"name":6413,"modelId":235,"published":13,"meta":6414,"query":6417,"data":6420,"variations":6520,"lastUpdated":6521,"firstPublished":6522,"testRatio":33,"screenshot":6523,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1744194259601,"412d1c352de34ac387addb38e04eb395","CyberBytes Podcast",{"breakpoints":6415,"originalContentId":3406,"kind":228,"lastPreviewUrl":6416,"hasLinks":6,"winningTest":118},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/cyberbytes-071823?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=412d1c352de34ac387addb38e04eb395&builder.overrides.412d1c352de34ac387addb38e04eb395=412d1c352de34ac387addb38e04eb395&builder.options.includeRefs=true&builder.options.enrich=true",[6418],{"@type":162,"property":163,"operator":164,"value":6419},"/resources/cyberbytes-071823",{"themeId":6,"description":6421,"title":6422,"seoTitle":6422,"type":1001,"seoDescription":6421,"coverImage":6423,"blocks":6424,"url":6419,"state":6517},"Push CEO & co-founder Adam Bateman appeared on the CyberBytes podcast to discuss securing SaaS apps. ","Adam Bateman appears on the CyberBytes podcast","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b2e7a16ff6a4d8f92d2685a41dd09f8",[6425,6495,6504,6512],{"@type":106,"@version":107,"id":6426,"meta":6427,"component":6428,"responsiveStyles":6492},"builder-44c2117d38684608812abc3056a216c5",{"previousId":3419},{"name":250,"options":6429},{"columns":6430,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6431,6468],{"blocks":6432,"width":311},[6433,6442,6452],{"@type":106,"@version":107,"id":6434,"meta":6435,"component":6436,"responsiveStyles":6439},"builder-4d6fb8f58a684763a95c09fac7833051",{"previousId":258},{"name":260,"tag":260,"options":6437},{"title":6438,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">CyberBytes:\u003C/span>\u003C/p>\u003Cp>Securing SaaS Apps with Push\u003C/p>",{"large":6440,"small":6441},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6443,"component":6444,"responsiveStyles":6450},"builder-914d4a6c7a85442395227f6d74587a86",{"name":301,"options":6445},{"options":6446},[6447],{"optionTitle":6448,"description":6449},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> CyberBytes\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Push CEO &amp; co-founder Adam Bateman appeared on the CyberBytes podcast to discuss securing SaaS apps. \u003C/span>\u003C/p>",{"large":6451},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6453,"component":6454,"responsiveStyles":6465},"builder-71b491fe629640deaf51a881b9fa1562",{"name":317,"options":6455},{"hosts":6456},[6457],{"host":6458},{"@type":17,"id":2020,"model":190,"value":6459},{"lastUpdatedBy":34,"folders":6460,"data":6461,"modelId":194,"query":6462,"published":13,"firstPublished":2029,"testRatio":33,"lastUpdated":2030,"createdDate":2031,"createdBy":34,"meta":6463,"variations":6464,"name":2034,"id":2020,"rev":2035},[],{"jobtitle":2024,"surname":2025,"name":2026,"avatar":2027},[],{"kind":36,"lastPreviewUrl":37},{},{"large":6466,"small":6467},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6469,"width":357},[6470,6478,6485],{"@type":106,"@version":107,"id":6471,"meta":6472,"component":6473,"responsiveStyles":6476},"builder-da62ffe3c0654423883311a1d04b1814",{"previousId":290},{"name":292,"options":6474},{"videoId":6475},"lUWFNWuUl8c",{"large":6477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":6479,"meta":6480,"component":6481,"responsiveStyles":6483},"builder-691be0efcbdf4b87a32b38c417db6782",{"previousId":338},{"name":340,"options":6482},{"text":2044},{"large":6484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":6486,"meta":6487,"component":6488,"responsiveStyles":6490},"builder-77e64453140a47d590968bdccef8ed6c",{"previousId":349},{"name":351,"tag":351,"options":6489},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":6491},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":6493,"small":6494},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":6496,"meta":6497,"component":6498,"responsiveStyles":6501},"builder-f1b45a777bd24927a32f7517d1d00ff7",{"previousId":3489},{"name":366,"tag":366,"options":6499},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6500},[],{"large":6502,"small":6503},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":6505,"meta":6506,"component":6507,"responsiveStyles":6509},"builder-20d205bb42aa4d9294364320b92d9aaa",{"previousId":3498},{"name":378,"options":6508},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":6510,"small":6511},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6513,"@type":106,"tagName":131,"properties":6514,"responsiveStyles":6515},"builder-pixel-8l7ml4d6hds",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6516},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6518},{"path":37,"query":6519},{},{},1744194597172,1744194597135,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc4fa375bcb3e4db1a64a6a251eb60dfc",{"folders":6525,"createdDate":6526,"id":6527,"name":6528,"modelId":235,"published":13,"meta":6529,"query":6532,"data":6535,"variations":6635,"lastUpdated":6636,"firstPublished":6637,"testRatio":33,"screenshot":6638,"createdBy":34,"lastUpdatedBy":72,"rev":408},[],1737048640071,"253f744fc1e34e26a268c2d33921c665","Pain in the SaaS",{"breakpoints":6530,"kind":228,"originalContentId":5216,"lastPreviewUrl":6531,"hasLinks":6,"winningTest":118},{"small":39,"medium":40},"https://app.dev.pushsecurity.com/resources/pain-in-the-saas-at-withsecure?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=253f744fc1e34e26a268c2d33921c665&builder.overrides.253f744fc1e34e26a268c2d33921c665=253f744fc1e34e26a268c2d33921c665",[6533],{"@type":162,"property":163,"operator":164,"value":6534},"/resources/pain-in-the-saas-at-withsecure",{"seoTitle":6528,"type":4215,"coverImage":6536,"themeId":6,"description":6537,"seoDescription":6537,"title":6528,"blocks":6538,"url":6534,"state":6632},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F2ad897612ba04ad393d8667f787719a7","Pain in the SaaS – How attackers are targeting SaaS services",[6539,6610,6619,6627],{"@type":106,"@version":107,"id":6540,"meta":6541,"component":6542,"responsiveStyles":6607},"builder-a848c8d071f747d79ff9bf39e39c9a74",{"previousId":2621},{"name":250,"options":6543},{"columns":6544,"space":270,"stackColumnsAt":271,"reverseColumnsWhenStacked":6},[6545,6583],{"blocks":6546,"width":311},[6547,6556,6566],{"@type":106,"@version":107,"id":6548,"meta":6549,"component":6550,"responsiveStyles":6553},"builder-239459c938a64e5fa406bb5358c6eceb",{"previousId":258},{"name":260,"tag":260,"options":6551},{"title":6552,"isCentered":6},"\u003Cp>\u003Cspan style=\"color: rgb(238, 49, 12);\">WithSecure Con:\u003C/span> \u003C/p>\u003Cp>Pain in the SaaS\u003C/p>",{"large":6554,"small":6555},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":265,"marginBottom":266,"textAlign":267,"paddingLeft":265,"paddingBottom":268},{"paddingLeft":265},{"@type":106,"@version":107,"id":6557,"component":6558,"responsiveStyles":6564},"builder-3fd75606624b45e98a5155b937258db2",{"name":301,"options":6559},{"options":6560},[6561],{"optionTitle":6562,"description":6563},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Pain in the SaaS\u003C/span>\u003C/p>","\u003Cp>\u003Cspan style=\"font-size: 18px;\">Luke Jennings, Vice President of R&amp;D at Push Security, gives a talk about new SaaS attack techniques at WithSecure Conference.\u003C/span>\u003C/p>",{"large":6565},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginLeft":265,"lineHeight":309,"fontSize":127},{"@type":106,"@version":107,"id":6567,"component":6568,"responsiveStyles":6580},"builder-e3b387661eb64e48bee6947c491ca52b",{"name":317,"options":6569},{"hosts":6570},[6571],{"host":6572},{"@type":17,"id":788,"model":190,"value":6573},{"createdDate":790,"id":788,"name":791,"modelId":194,"published":13,"query":6574,"data":6575,"variations":6576,"lastUpdated":799,"firstPublished":800,"testRatio":33,"createdBy":34,"lastUpdatedBy":72,"folders":6577,"meta":6578,"rev":804},[],{"name":794,"avatar":795,"surname":796,"jobtitle":797},{},[],{"breakpoints":6579,"lastPreviewUrl":37,"kind":36,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"large":6581,"small":6582},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":332,"paddingTop":265,"marginTop":310},{"display":140},{"blocks":6584,"width":357},[6585,6593,6600],{"@type":106,"@version":107,"id":6586,"meta":6587,"component":6588,"responsiveStyles":6591},"builder-7ad944cdd63244da81aaac7169b9dd51",{"previousId":290},{"name":292,"options":6589},{"videoId":6590},"RawrJcMK6oQ",{"large":6592},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingLeft":265,"paddingRight":265,"marginTop":297,"marginLeft":265,"marginRight":265},{"@type":106,"@version":107,"id":6594,"meta":6595,"component":6596,"responsiveStyles":6598},"builder-1b18b4bd3843465891d3d33ff3bfcb91",{"previousId":338},{"name":340,"options":6597},{"text":813},{"large":6599},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"lineHeight":309,"height":345,"fontSize":127,"paddingLeft":332,"paddingBottom":332,"textAlign":267,"paddingTop":332},{"@type":106,"@version":107,"id":6601,"meta":6602,"component":6603,"responsiveStyles":6605},"builder-ee931786968841cfbc9dc673812d7cc2",{"previousId":349},{"name":351,"tag":351,"options":6604},{"align":267,"size":142,"text":353,"redirect":354,"redirectOpenInNewTab":41},{"large":6606},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":345},{"large":6608,"small":6609},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":265,"maxWidth":274,"marginTop":275,"paddingRight":265,"marginRight":276,"marginLeft":276},{"marginLeft":265,"marginRight":265,"marginTop":265},{"@type":106,"@version":107,"id":6611,"meta":6612,"component":6613,"responsiveStyles":6616},"builder-fbc50b7174f44348b6bfd54b093e1773",{"previousId":2703},{"name":366,"tag":366,"options":6614},{"AllPartners":41,"leftAlignPartners":6,"backgroundTransparent":41,"Partners":6615},[],{"large":6617,"small":6618},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":371,"paddingLeft":268,"marginLeft":310,"marginRight":310},{"display":140},{"@type":106,"@version":107,"id":6620,"meta":6621,"component":6622,"responsiveStyles":6624},"builder-6349124a02a34e3caa3974f85e75ec62",{"previousId":2712},{"name":378,"options":6623},{"image":380,"backgroundSize":381,"backgroundPosition":267,"lazy":6,"fitContent":41,"aspectRatio":382,"lockAspectRatio":6,"noWebp":41,"height":383,"width":384,"sizes":2834},{"large":6625,"small":6626},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"width":388,"minHeight":310,"minWidth":310,"overflow":139,"marginTop":389,"marginLeft":310,"marginRight":310},{"marginTop":310,"marginLeft":265,"marginRight":265},{"id":6628,"@type":106,"tagName":131,"properties":6629,"responsiveStyles":6630},"builder-pixel-f4843scq5ol",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6631},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6633},{"path":37,"query":6634},{},{},1742307519701,1737104648681,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc789725857254cbeae6986dfd6d9a1e5",[6640,6743,6862,6981,7099,7219,7339,7459],{"createdDate":6641,"id":6642,"name":6643,"modelId":6644,"published":13,"stageModifiedSincePublish":6,"query":6645,"data":6648,"variations":6733,"lastUpdated":6734,"firstPublished":6735,"testRatio":33,"screenshot":6736,"createdBy":34,"lastUpdatedBy":1742,"folders":6737,"meta":6738,"rev":6742},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[6646],{"@type":162,"property":163,"operator":164,"value":6647},"/uc/zero-day-phishing-protection",{"inputs":6649,"customFonts":6650,"seoTitle":6655,"title":6655,"tsCode":37,"seoDescription":6656,"fontAwesomeIcon":6657,"jsCode":37,"blocks":6658,"url":6647,"state":6730},[],[6651],{"family":1391,"kind":1412,"version":1392,"lastModified":1390,"files":6652,"category":1389,"menu":1431,"subsets":6653,"variants":6654},{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"800italic":1410,"900italic":1409,"700italic":1403,"100italic":1408,"italic":1407,"regular":1404,"200italic":1405,"500italic":1406,"300italic":1411,"600italic":1402},[1387,1388],[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],"Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[6659,6725],{"@type":106,"@version":107,"tagName":1453,"id":1456,"children":6660},[6661,6677,6682,6687,6695,6701,6706,6711,6717],{"@type":106,"@version":107,"layerName":6662,"id":6663,"component":6664,"responsiveStyles":6675},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":6662,"options":6665,"isRSC":118},{"title":6655,"description":6666,"points":6667,"video":6674},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[6668,6670,6672],{"item":6669},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":6671},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":6673},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":6676},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":1461,"component":6678,"responsiveStyles":6680},{"name":366,"options":6679,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":6681},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":1470,"component":6683,"responsiveStyles":6685},{"name":1472,"options":6684,"isRSC":118},{"darkMode":41},{"large":6686},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":428,"id":1486,"component":6688,"responsiveStyles":6693},{"name":428,"tag":428,"options":6689,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":6690,"description":6691,"animatedTitle":37,"image":6692,"reverse":6,"descriptionPaddingHorizontal":118},"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":6694},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1660,"component":6696,"responsiveStyles":6699},{"name":458,"options":6697,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":1664,"description":6698,"reverse":41,"image":1666},"\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>",{"large":6700},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":310,"marginTop":265},{"@type":106,"@version":107,"id":1675,"component":6702,"responsiveStyles":6704},{"name":458,"options":6703,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":1679,"description":1680,"reverse":6,"image":1681},{"large":6705},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":1690,"component":6707,"responsiveStyles":6709},{"name":458,"options":6708,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":1694,"description":1695,"reverse":41,"image":1696},{"large":6710},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":6712,"component":6713,"responsiveStyles":6715},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":1472,"options":6714,"isRSC":118},{"darkMode":6},{"large":6716},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6718,"component":6719,"responsiveStyles":6723},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":6720,"tag":6720,"options":6721,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":6722},"bg-black",{"large":6724},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":6726,"@type":106,"tagName":131,"properties":6727,"responsiveStyles":6728},"builder-pixel-h6onu0ubr9",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6729},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6731},{"path":37,"query":6732},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f",[],{"lastPreviewUrl":6739,"winningTest":118,"breakpoints":6740,"kind":228,"hasLinks":6,"originalContentId":6741,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"2daa5670b8504fc7ba4700633e8bd921","wjcv5yvqyja",{"createdDate":6744,"id":6745,"name":6746,"modelId":6644,"published":13,"stageModifiedSincePublish":6,"query":6747,"data":6750,"variations":6854,"lastUpdated":6855,"firstPublished":6856,"testRatio":33,"screenshot":6857,"createdBy":34,"lastUpdatedBy":1742,"folders":6858,"meta":6859,"rev":6742},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[6748],{"@type":162,"property":163,"operator":164,"value":6749},"/uc/browser-extension-security",{"seoDescription":6751,"jsCode":37,"fontAwesomeIcon":6752,"tsCode":37,"title":6746,"seoTitle":6746,"customFonts":6753,"inputs":6758,"blocks":6759,"url":6749,"state":6851},"Shine a light on risky browser extensions.","faPuzzlePiece",[6754],{"kind":1412,"family":1391,"version":1392,"files":6755,"category":1389,"lastModified":1390,"subsets":6756,"variants":6757,"menu":1431},{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"100italic":1408,"italic":1407,"regular":1404,"900italic":1409,"800italic":1410,"700italic":1403,"200italic":1405,"300italic":1411,"500italic":1406,"600italic":1402},[1387,1388],[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],[],[6760,6846],{"@type":106,"@version":107,"tagName":1453,"id":6761,"meta":6762,"children":6763},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":1456},[6764,6780,6787,6794,6803,6813,6823,6833,6840],{"@type":106,"@version":107,"id":6765,"meta":6766,"component":6767,"responsiveStyles":6778},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":6663},{"name":6662,"options":6768,"isRSC":118},{"title":6746,"description":6769,"points":6770,"video":6777},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[6771,6773,6775],{"item":6772},"Discover every browser extension in use",{"item":6774},"Spot risky or unsanctioned behavior",{"item":6776},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":6779},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":6781,"meta":6782,"component":6783,"responsiveStyles":6785},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":1461},{"name":366,"options":6784,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":6786},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":6788,"meta":6789,"component":6790,"responsiveStyles":6792},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":1470},{"name":1472,"options":6791,"isRSC":118},{"darkMode":41},{"large":6793},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":428,"id":6795,"component":6796,"responsiveStyles":6801},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":428,"tag":428,"options":6797,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":6798,"description":6799,"image":6800,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":6802},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6804,"meta":6805,"component":6806,"responsiveStyles":6811},"builder-93738f98109a4009affb349afd7bb182",{"previousId":1660},{"name":458,"options":6807,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":6808,"description":6809,"reverse":41,"image":6810},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":6812},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":310,"marginTop":265},{"@type":106,"@version":107,"id":6814,"meta":6815,"component":6816,"responsiveStyles":6821},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":1675},{"name":458,"options":6817,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":6818,"description":6819,"reverse":6,"image":6820},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":6822},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":6824,"meta":6825,"component":6826,"responsiveStyles":6831},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":1690},{"name":458,"options":6827,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":6828,"description":6829,"reverse":41,"image":6830},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":6832},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":6834,"meta":6835,"component":6836,"responsiveStyles":6838},"builder-1a689287d1a1418997d57db578a71105",{"previousId":6712},{"name":1472,"options":6837,"isRSC":118},{"darkMode":6},{"large":6839},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6841,"component":6842,"responsiveStyles":6844},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":6720,"tag":6720,"options":6843,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":6845},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":6847,"@type":106,"tagName":131,"properties":6848,"responsiveStyles":6849},"builder-pixel-jc4lv2mnufo",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6850},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6852},{"path":37,"query":6853},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":228,"winningTest":118,"breakpoints":6860,"lastPreviewUrl":6861,"hasLinks":6,"originalContentId":6642,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":6863,"id":6864,"name":6865,"modelId":6644,"published":13,"query":6866,"data":6869,"variations":6972,"lastUpdated":6973,"firstPublished":6974,"testRatio":33,"screenshot":6975,"createdBy":34,"lastUpdatedBy":6976,"folders":6977,"meta":6978,"rev":6742},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[6867],{"@type":162,"property":163,"operator":164,"value":6868},"/uc/account-takeover-detection",{"title":6865,"customFonts":6870,"jsCode":37,"seoTitle":6865,"seoDescription":6875,"fontAwesomeIcon":6876,"tsCode":37,"blocks":6877,"url":6868,"state":6969},[6871],{"kind":1412,"category":1389,"variants":6872,"menu":1431,"files":6873,"family":1391,"subsets":6874,"version":1392,"lastModified":1390},[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"300italic":1411,"500italic":1406,"800italic":1410,"700italic":1403,"italic":1407,"900italic":1409,"600italic":1402,"200italic":1405,"regular":1404,"100italic":1408},[1387,1388],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[6878,6964],{"@type":106,"@version":107,"tagName":1453,"id":6879,"meta":6880,"children":6881},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":1456},[6882,6898,6905,6912,6921,6931,6941,6951,6958],{"@type":106,"@version":107,"id":6883,"meta":6884,"component":6885,"responsiveStyles":6896},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":6663},{"name":6662,"options":6886,"isRSC":118},{"title":6865,"description":6887,"points":6888,"video":6895},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[6889,6891,6893],{"item":6890},"Identify credential-based ATO as it unfolds",{"item":6892},"Surface hijacked sessions and token misuse",{"item":6894},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":6897},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":6899,"meta":6900,"component":6901,"responsiveStyles":6903},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":1461},{"name":366,"options":6902,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":6904},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":6906,"meta":6907,"component":6908,"responsiveStyles":6910},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":1470},{"name":1472,"options":6909,"isRSC":118},{"darkMode":41},{"large":6911},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6913,"component":6914,"responsiveStyles":6919},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":428,"tag":428,"options":6915,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":6916,"description":6917,"image":6918,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":6920},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6922,"meta":6923,"component":6924,"responsiveStyles":6929},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":1660},{"name":458,"options":6925,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":6926,"description":6927,"reverse":41,"image":6928},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":6930},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":265,"marginTop":265},{"@type":106,"@version":107,"id":6932,"meta":6933,"component":6934,"responsiveStyles":6939},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":1675},{"name":458,"options":6935,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":6936,"description":6937,"reverse":6,"image":6938},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":6940},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":6942,"meta":6943,"component":6944,"responsiveStyles":6949},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":1690},{"name":458,"options":6945,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":6946,"description":6947,"reverse":41,"image":6948},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":6950},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":6952,"meta":6953,"component":6954,"responsiveStyles":6956},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":6712},{"name":1472,"options":6955,"isRSC":118},{"darkMode":6},{"large":6957},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":6959,"component":6960,"responsiveStyles":6962},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":6720,"tag":6720,"options":6961,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":6963},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":6965,"@type":106,"tagName":131,"properties":6966,"responsiveStyles":6967},"builder-pixel-bp9ni6h4vze",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":6968},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":6970},{"path":37,"query":6971},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":6979,"hasLinks":6,"originalContentId":6642,"breakpoints":6980,"winningTest":118,"kind":228,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":6982,"id":6983,"name":6984,"modelId":6644,"published":13,"query":6985,"data":6988,"variations":7091,"lastUpdated":7092,"firstPublished":7093,"testRatio":33,"screenshot":7094,"createdBy":34,"lastUpdatedBy":6976,"folders":7095,"meta":7096,"rev":6742},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[6986],{"@type":162,"property":163,"operator":164,"value":6987},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":6989,"jsCode":37,"customFonts":6990,"fontAwesomeIcon":6995,"seoTitle":6984,"title":6984,"blocks":6996,"url":6987,"state":7088},"Harden access paths with visibility,  detection, and guardrails.",[6991],{"kind":1412,"files":6992,"version":1392,"lastModified":1390,"subsets":6993,"menu":1431,"category":1389,"variants":6994,"family":1391},{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"regular":1404,"italic":1407,"800italic":1410,"500italic":1406,"600italic":1402,"200italic":1405,"900italic":1409,"700italic":1403,"100italic":1408,"300italic":1411},[1387,1388],[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],"faRadar",[6997,7083],{"@type":106,"@version":107,"tagName":1453,"id":6998,"meta":6999,"children":7000},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":6879},[7001,7017,7024,7031,7040,7050,7060,7070,7077],{"@type":106,"@version":107,"id":7002,"meta":7003,"component":7004,"responsiveStyles":7015},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":6883},{"name":6662,"options":7005,"isRSC":118},{"title":6984,"description":7006,"points":7007,"video":7014},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[7008,7010,7012],{"item":7009},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":7011},"Monitor how users actually log in across apps, flows, and tools",{"item":7013},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":7016},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":7018,"meta":7019,"component":7020,"responsiveStyles":7022},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":6899},{"name":366,"options":7021,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":7023},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":7025,"meta":7026,"component":7027,"responsiveStyles":7029},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":6906},{"name":1472,"options":7028,"isRSC":118},{"darkMode":41},{"large":7030},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7032,"component":7033,"responsiveStyles":7038},"builder-dec0246085e1485c803f7152b1922a81",{"name":428,"tag":428,"options":7034,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":7035,"description":7036,"image":7037,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":7039},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7041,"meta":7042,"component":7043,"responsiveStyles":7048},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":6922},{"name":458,"options":7044,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":7045,"description":7046,"reverse":41,"image":7047},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":7049},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":310,"marginTop":265},{"@type":106,"@version":107,"id":7051,"meta":7052,"component":7053,"responsiveStyles":7058},"builder-431d175c59004669b0b2776b07d71737",{"previousId":6932},{"name":458,"options":7054,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":7055,"description":7056,"reverse":6,"image":7057},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":7059},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":7061,"meta":7062,"component":7063,"responsiveStyles":7068},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":6942},{"name":458,"options":7064,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":7065,"description":7066,"reverse":41,"image":7067},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":7069},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":7071,"meta":7072,"component":7073,"responsiveStyles":7075},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":6952},{"name":1472,"options":7074,"isRSC":118},{"darkMode":6},{"large":7076},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7078,"component":7079,"responsiveStyles":7081},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":6720,"tag":6720,"options":7080,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":7082},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7084,"@type":106,"tagName":131,"properties":7085,"responsiveStyles":7086},"builder-pixel-hqgadf1h59w",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7087},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7089},{"path":37,"query":7090},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":228,"lastPreviewUrl":7097,"breakpoints":7098,"hasLinks":6,"originalContentId":6864,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":7100,"id":7101,"name":7102,"modelId":6644,"published":13,"query":7103,"data":7106,"variations":7211,"lastUpdated":7212,"firstPublished":7213,"testRatio":33,"screenshot":7214,"createdBy":34,"lastUpdatedBy":6976,"folders":7215,"meta":7216,"rev":6742},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[7104],{"@type":162,"property":163,"operator":164,"value":7105},"/uc/clickfix-protection",{"seoDescription":7107,"fontAwesomeIcon":7108,"customFonts":7109,"seoTitle":7114,"jsCode":37,"tsCode":37,"title":7114,"blocks":7115,"url":7105,"state":7208},"Block attacks that trick users into running malicious code.","faLaptopCode",[7110],{"files":7111,"subsets":7112,"menu":1431,"version":1392,"kind":1412,"family":1391,"lastModified":1390,"variants":7113,"category":1389},{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"200italic":1405,"800italic":1410,"700italic":1403,"600italic":1402,"100italic":1408,"italic":1407,"regular":1404,"300italic":1411,"500italic":1406,"900italic":1409},[1387,1388],[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],"ClickFix protection",[7116,7203],{"@type":106,"@version":107,"tagName":1453,"id":7117,"meta":7118,"children":7119},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":6998},[7120,7136,7143,7150,7160,7170,7180,7190,7197],{"@type":106,"@version":107,"id":7121,"meta":7122,"component":7123,"responsiveStyles":7134},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":7002},{"name":6662,"options":7124,"isRSC":118},{"title":7114,"description":7125,"points":7126,"image":7133},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[7127,7129,7131],{"item":7128},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":7130},"Block malicious copy-and-paste actions before code is executed",{"item":7132},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":7135},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":7137,"meta":7138,"component":7139,"responsiveStyles":7141},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":7018},{"name":366,"options":7140,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":7142},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":7144,"meta":7145,"component":7146,"responsiveStyles":7148},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":7025},{"name":1472,"options":7147,"isRSC":118},{"darkMode":41},{"large":7149},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7151,"meta":7152,"component":7153,"responsiveStyles":7158},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":7032},{"name":428,"tag":428,"options":7154,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":7155,"description":7156,"reverse":6,"image":7157},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":7159},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7161,"meta":7162,"component":7163,"responsiveStyles":7168},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":7041},{"name":458,"options":7164,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":7165,"description":7166,"reverse":41,"image":7167},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":7169},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":310,"marginTop":265},{"@type":106,"@version":107,"id":7171,"meta":7172,"component":7173,"responsiveStyles":7178},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":7051},{"name":458,"options":7174,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":7175,"description":7176,"reverse":6,"image":7177},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":7179},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":7181,"meta":7182,"component":7183,"responsiveStyles":7188},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":7061},{"name":458,"options":7184,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":7185,"description":7186,"reverse":41,"image":7187},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":7189},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":7191,"meta":7192,"component":7193,"responsiveStyles":7195},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":7071},{"name":1472,"options":7194,"isRSC":118},{"darkMode":6},{"large":7196},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7198,"component":7199,"responsiveStyles":7201},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":6720,"tag":6720,"options":7200,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":7202},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7204,"@type":106,"tagName":131,"properties":7205,"responsiveStyles":7206},"builder-pixel-jb7i4u6v2mk",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7207},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7209},{"path":37,"query":7210},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":7217,"originalContentId":6983,"winningTest":118,"hasLinks":6,"kind":228,"breakpoints":7218,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":7220,"id":7221,"name":7222,"modelId":6644,"published":13,"query":7223,"data":7226,"variations":7331,"lastUpdated":7332,"firstPublished":7333,"testRatio":33,"screenshot":7334,"createdBy":34,"lastUpdatedBy":6976,"folders":7335,"meta":7336,"rev":6742},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[7224],{"@type":162,"property":163,"operator":164,"value":7225},"/uc/incident-response",{"seoDescription":7227,"customFonts":7228,"title":7222,"jsCode":37,"fontAwesomeIcon":7233,"seoTitle":7234,"tsCode":37,"blocks":7235,"url":7225,"state":7328},"Investigate and respond faster with unique browser telemetry.",[7229],{"kind":1412,"subsets":7230,"menu":1431,"variants":7231,"category":1389,"family":1391,"version":1392,"lastModified":1390,"files":7232},[1387,1388],[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"900italic":1409,"600italic":1402,"200italic":1405,"300italic":1411,"100italic":1408,"700italic":1403,"800italic":1410,"regular":1404,"italic":1407,"500italic":1406},"faSatelliteDish","Browser based incident response",[7236,7323],{"@type":106,"@version":107,"tagName":1453,"id":7237,"meta":7238,"children":7239},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":6998},[7240,7257,7264,7271,7280,7290,7300,7310,7317],{"@type":106,"@version":107,"id":7241,"meta":7242,"component":7243,"responsiveStyles":7255},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":7002},{"name":6662,"options":7244,"isRSC":118},{"title":7245,"description":7246,"points":7247,"video":7254},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[7248,7250,7252],{"item":7249},"Reconstruct what happened with real browser session context",{"item":7251},"Investigate faster with real-world session context",{"item":7253},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":7256},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":7258,"meta":7259,"component":7260,"responsiveStyles":7262},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":7018},{"name":366,"options":7261,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":7263},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":7265,"meta":7266,"component":7267,"responsiveStyles":7269},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":7025},{"name":1472,"options":7268,"isRSC":118},{"darkMode":41},{"large":7270},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7272,"component":7273,"responsiveStyles":7278},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":428,"tag":428,"options":7274,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":7275,"description":7276,"image":7277,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":7279},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7281,"meta":7282,"component":7283,"responsiveStyles":7288},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":7041},{"name":458,"options":7284,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":7285,"description":7286,"reverse":41,"image":7287},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":7289},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":265,"marginTop":265},{"@type":106,"@version":107,"id":7291,"meta":7292,"component":7293,"responsiveStyles":7298},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":7051},{"name":458,"options":7294,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":7295,"description":7296,"reverse":6,"image":7297},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":7299},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":7301,"meta":7302,"component":7303,"responsiveStyles":7308},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":7061},{"name":458,"options":7304,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":7305,"description":7306,"reverse":41,"image":7307},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":7309},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":7311,"meta":7312,"component":7313,"responsiveStyles":7315},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":7071},{"name":1472,"options":7314,"isRSC":118},{"darkMode":6},{"large":7316},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7318,"component":7319,"responsiveStyles":7321},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":6720,"tag":6720,"options":7320,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":7322},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7324,"@type":106,"tagName":131,"properties":7325,"responsiveStyles":7326},"builder-pixel-t20dmmgkd7",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7327},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7329},{"path":37,"query":7330},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":228,"breakpoints":7337,"originalContentId":6983,"winningTest":118,"lastPreviewUrl":7338,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":7340,"id":7341,"name":7342,"modelId":6644,"published":13,"query":7343,"data":7346,"variations":7451,"lastUpdated":7452,"firstPublished":7453,"testRatio":33,"screenshot":7454,"createdBy":34,"lastUpdatedBy":6976,"folders":7455,"meta":7456,"rev":6742},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[7344],{"@type":162,"property":163,"operator":164,"value":7345},"/uc/shadow-saas",{"seoTitle":7347,"seoDescription":7348,"customFonts":7349,"fontAwesomeIcon":7354,"title":7355,"jsCode":37,"tsCode":37,"blocks":7356,"url":7345,"state":7448},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[7350],{"kind":1412,"variants":7351,"files":7352,"family":1391,"version":1392,"subsets":7353,"lastModified":1390,"category":1389,"menu":1431},[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"300italic":1411,"500italic":1406,"regular":1404,"900italic":1409,"italic":1407,"100italic":1408,"200italic":1405,"600italic":1402,"700italic":1403,"800italic":1410},[1387,1388],"faShieldCheck","Secure shadow SaaS",[7357,7443],{"@type":106,"@version":107,"tagName":1453,"id":7358,"meta":7359,"children":7360},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":7237},[7361,7377,7384,7391,7400,7410,7420,7430,7437],{"@type":106,"@version":107,"id":7362,"meta":7363,"component":7364,"responsiveStyles":7375},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":7241},{"name":6662,"options":7365,"isRSC":118},{"title":7347,"description":7366,"points":7367,"video":7374},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[7368,7370,7372],{"item":7369},"Discover every SaaS app users access, managed or not",{"item":7371},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":7373},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":7376},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":7378,"meta":7379,"component":7380,"responsiveStyles":7382},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":7258},{"name":366,"options":7381,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":7383},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":7385,"meta":7386,"component":7387,"responsiveStyles":7389},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":7265},{"name":1472,"options":7388,"isRSC":118},{"darkMode":41},{"large":7390},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7392,"component":7393,"responsiveStyles":7398},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":428,"tag":428,"options":7394,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":7395,"description":7396,"image":7397,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":7399},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7401,"meta":7402,"component":7403,"responsiveStyles":7408},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":7281},{"name":458,"options":7404,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":7405,"description":7406,"reverse":41,"image":7407},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":7409},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":265,"marginTop":265},{"@type":106,"@version":107,"id":7411,"meta":7412,"component":7413,"responsiveStyles":7418},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":7291},{"name":458,"options":7414,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":7415,"description":7416,"reverse":6,"image":7417},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":7419},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":7421,"meta":7422,"component":7423,"responsiveStyles":7428},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":7301},{"name":458,"options":7424,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":7425,"description":7426,"reverse":41,"image":7427},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":7429},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":7431,"meta":7432,"component":7433,"responsiveStyles":7435},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":7311},{"name":1472,"options":7434,"isRSC":118},{"darkMode":6},{"large":7436},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7438,"component":7439,"responsiveStyles":7441},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":6720,"tag":6720,"options":7440,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":7442},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7444,"@type":106,"tagName":131,"properties":7445,"responsiveStyles":7446},"builder-pixel-225hg4jfk9t",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7447},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7449},{"path":37,"query":7450},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":7221,"winningTest":118,"lastPreviewUrl":7457,"breakpoints":7458,"kind":228,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":7460,"id":7461,"name":7462,"modelId":6644,"published":13,"query":7463,"data":7466,"variations":7568,"lastUpdated":7569,"firstPublished":7570,"testRatio":33,"screenshot":7571,"createdBy":34,"lastUpdatedBy":6976,"folders":7572,"meta":7573,"rev":6742},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[7464],{"@type":162,"property":163,"operator":164,"value":7465},"/uc/shadow-ai",{"fontAwesomeIcon":7467,"seoTitle":7468,"jsCode":37,"customFonts":7469,"title":7474,"tsCode":37,"seoDescription":7475,"blocks":7476,"url":7465,"state":7565},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[7470],{"variants":7471,"category":1389,"files":7472,"subsets":7473,"family":1391,"kind":1412,"menu":1431,"lastModified":1390,"version":1392},[1414,1415,1416,1417,1418,1419,128,1420,1421,1422,1423,1424,1425,1426,1427,1428,1429,1430],{"100":1394,"200":1395,"300":1396,"500":1397,"600":1398,"700":1399,"800":1400,"900":1401,"800italic":1410,"regular":1404,"700italic":1403,"200italic":1405,"italic":1407,"500italic":1406,"600italic":1402,"300italic":1411,"100italic":1408,"900italic":1409},[1387,1388],"Secure shadow AI","See and control shadow AI apps in the browser.",[7477,7560],{"@type":106,"@version":107,"tagName":1453,"id":7478,"meta":7479,"children":7480},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":7358},[7481,7496,7503,7510,7519,7528,7537,7547,7554],{"@type":106,"@version":107,"id":7482,"meta":7483,"component":7484,"responsiveStyles":7494},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":7362},{"name":6662,"options":7485,"isRSC":118},{"title":7474,"description":7486,"points":7487,"image":1447},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[7488,7490,7492],{"item":7489},"Map every AI tool used across your workforce",{"item":7491},"Review and classify apps by sensitivity, purpose, and policy status",{"item":7493},"Enforce AI usage rules directly in the browser",{"large":7495},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":436},{"@type":106,"@version":107,"id":7497,"meta":7498,"component":7499,"responsiveStyles":7501},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":7378},{"name":366,"options":7500,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":7502},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1466},{"@type":106,"@version":107,"id":7504,"meta":7505,"component":7506,"responsiveStyles":7508},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":7385},{"name":1472,"options":7507,"isRSC":118},{"darkMode":41},{"large":7509},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7511,"meta":7512,"component":7513,"responsiveStyles":7517},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":7392},{"name":428,"tag":428,"options":7514,"isRSC":118},{"darkMode":6,"maxWidth":430,"maxTextWidth":1489,"title":7515,"description":7516,"image":1492,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>",{"large":7518},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7520,"meta":7521,"component":7522,"responsiveStyles":7526},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":7401},{"name":458,"options":7523,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1663,"title":7524,"description":7525,"reverse":41,"image":7417},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":7527},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1669,"paddingTop":265,"marginTop":265},{"@type":106,"@version":107,"id":7529,"meta":7530,"component":7531,"responsiveStyles":7535},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":7411},{"name":458,"options":7532,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1678,"title":7533,"description":7534,"reverse":6,"image":7427},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":7536},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1684},{"@type":106,"@version":107,"layerName":458,"id":7538,"meta":7539,"component":7540,"responsiveStyles":7545},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":7421},{"name":458,"options":7541,"isRSC":118},{"darkMode":6,"maxWidth":430,"imageMaxWidth":461,"textPaddingTop":1693,"title":7542,"description":7543,"reverse":41,"image":7544},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":7546},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1699},{"@type":106,"@version":107,"id":7548,"meta":7549,"component":7550,"responsiveStyles":7552},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":7431},{"name":1472,"options":7551,"isRSC":118},{"darkMode":6},{"large":7553},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7555,"component":7556,"responsiveStyles":7558},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":6720,"tag":6720,"options":7557,"isRSC":118},{"sectionHeading":37,"customClass":6722},{"large":7559},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7561,"@type":106,"tagName":131,"properties":7562,"responsiveStyles":7563},"builder-pixel-gvb5hb3oa9q",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7564},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7566},{"path":37,"query":7567},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":7574,"originalContentId":7341,"kind":228,"lastPreviewUrl":7575,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",[7577,7736,7892,8028],{"createdDate":7578,"id":7579,"name":7580,"modelId":7581,"published":13,"query":7582,"data":7585,"variations":7726,"lastUpdated":7727,"firstPublished":7728,"testRatio":33,"screenshot":7729,"createdBy":53,"lastUpdatedBy":72,"folders":7730,"meta":7731,"rev":7735},1762795321508,"08b65992e49d4c2c9db231662879f089","Cribl","989720d5a128470cb938ca12aedfef29",[7583],{"@type":162,"property":163,"operator":164,"value":7584},"/customer-stories/cribl",{"effectivePublishDate":7586,"seoDescription":7587,"seoTitle":7588,"indexPageDescription":7589,"resourcesPageTitle":7588,"title":7590,"ogImage":7591,"indexPageDesciption":7592,"resourcesPageDescription":7587,"logo":7591,"description":7593,"themeId":6,"resourcesPageImage":7594,"blocks":7595,"url":7584,"state":7723},"Sat Nov 15 2025 00:00:00 GMT+0000 (Greenwich Mean Time)","How Cribl leverages Push to enhance proactive browser security.","Customer Story: Cribl","Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps — risks that had previously gone unquantified.","dummy","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F790a9cc56084478592eae39f53790e4c","Push helped Inductive find and secure shadow accounts and apps with high-fidelity data in a way that didn't interfere with employees productivity.","How Cribl leverages Push to enhance proactive browser security. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5542d0f63c334af3bfcb4fe02fba2921",[7596,7609,7637,7652,7671,7688,7708,7718],{"@type":106,"@version":107,"id":7597,"meta":7598,"component":7600,"responsiveStyles":7607},"builder-d24b4ac0dd42473296e916eb5192bacf",{"previousId":7599},"builder-358a6779ad884910828de44db2f7109a",{"name":7601,"tag":7602,"options":7603,"isRSC":118},"CS Hero","CustomerStoriesHero",{"heroTitle":7588,"heroDescription":7604,"heroLogo":7605,"glowColor":7606},"\u003Cp>Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps — risks that had previously gone unquantified.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F000dad7ce3904fa9959f4ac8bc0681c0","#5EBCB7",{"large":7608},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7610,"meta":7611,"component":7613,"responsiveStyles":7635},"builder-b79065fa8efd4eb68427e7648ec49e0c",{"previousId":7612},"builder-639f543377f343e1aeefd0da4c808dca",{"name":7614,"tag":7615,"options":7616,"isRSC":118},"CS Summary","CustomerStoriesSummary",{"summaryTitle":7617,"summaryDescription":7618,"summaryStat1":7619,"summaryStat2":7622,"summaryStat3":7626,"summaryStat4":7627,"stats":7628},"About Cribl","\u003Cp>Cribl is an American company developing a data platform for information technology and security operations teams. Their solutions give organizations control and flexibility over their observability and security data.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Cribl chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Cribl, a leader in data management for IT and security teams, wanted a security solution that could support its proactive approach to identity and browser security in a fast-moving, remote-first environment. Their goal was to enhance the security of identities and applications beyond what traditional IdP and SSO tools could cover, without slowing down their work.\u003C/li>\u003Cli>Push helped Cribl validate and quantify hard-to-detect risks, including misconfigured login pages for key business applications that were allowing a significant number of users to bypass SSO.\u003C/li>\u003Cli>The Cribl security team used Push's flexible, high-fidelity data to scale their existing detection and response workflows, reduce manual effort, and enforce policy with confidence, without introducing friction for end users.\u003C/li>\u003C/ul>",{"icon":7354,"value":7620,"gap":118,"extraValueText":37,"helpText":7621},1118,"Users protected",{"icon":7623,"value":33,"gap":33,"extraValueText":7624,"helpText":7625},"faStopwatch","+","Hours saved per investigation",{"icon":37,"value":118,"extraValueText":37,"helpText":37},{"icon":37,"value":118,"extraValueText":37,"helpText":37},[7629,7633,7634],{"formatValue":6,"icon":7630,"value":7631,"gap":462,"helpText":7632,"extraValueText":37},"faBuildingFlag",2024,"Protected by Push since 2024",{"formatValue":41,"icon":7354,"value":7620,"gap":462,"helpText":7621},{"formatValue":41,"icon":7623,"value":33,"gap":462,"helpText":7625,"extraValueText":7624},{"large":7636},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7638,"meta":7639,"component":7641,"responsiveStyles":7650},"builder-02be3f7cafb3473baa83d3132b6aa9f2",{"previousId":7640},"builder-c1e460bfc9dd4dd19a5eedad71702d9b",{"name":7642,"tag":7643,"options":7644,"isRSC":118},"CS Quote Carousel","CustomerStoriesQuoteCarousel",{"quoteCarousel":7645},[7646],{"author":7647,"jobTitle":7648,"quote":7649},"Alex Crusco","Staff Security Engineer","\u003Cp>We knew one of our biggest risks was tied to identity. Push was the only solution that could give us a true picture of that attack surface, connecting employee actions directly to the SaaS apps they use every day.\u003C/p>",{"large":7651},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":265},{"@type":106,"@version":107,"id":7653,"meta":7654,"component":7656,"responsiveStyles":7669},"builder-70d8cc0ef9894b2485588da68e6662fd",{"previousId":7655},"builder-1cb31d58a3084cebae42a5a4cceec88b",{"name":7657,"tag":7658,"options":7659,"isRSC":118},"CS Quote Summary","CustomerStoriesQuoteSummary",{"theme":7660,"sections":7661,"title":7667,"diagonalVariant":7668},"dark-gradient",[7662],{"text":7663,"quotes":7664},"\u003Cp>As a remote-first company, Cribl empowers its employees with the flexibility to innovate quickly. This freedom, though, creates a common challenge for security teams in remote-first environments: the inherent difficulty in gaining deep visibility into the browser-based attack surface, even with a robust security stack.\u003C/p>\u003Cp>\"I threat-modeled every single thing that we could think of that could possibly go wrong, and identity was high on that list,\" said Alex Crusco, Staff Security Engineer at Cribl. \"There are many ways attackers can manipulate users and gain access without triggering traditional alerts.\"\u003C/p>\u003Cp>The team needed a solution that wouldn't slow the business down but could deliver concrete high-confidence data about identity hygiene and risky app behavior. \"Without the right data, this problem was just a theory,\" said Aaron Thummel, Senior Security Analyst. \"Push gave us the data to quantify the risk and drive real change. It's hard to get a security initiative off the ground without solid numbers to back it up.\"\u003C/p>",[7665],{"quote":7666,"quoteBy":7580},"\u003Cp>Without the right data, this problem was just a theory. Push gave us the data to quantify the risk and drive real change. It's hard to get a security initiative off the ground without solid numbers to back it up.\u003C/p>\n","Business Challenge","black-black",{"large":7670},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7672,"meta":7673,"component":7675,"responsiveStyles":7686},"builder-d75d70b0f4cc47708c02ed0405dd39fd",{"previousId":7674},"builder-99a5a96c9ce04e3483b9e8156a81006c",{"name":7657,"tag":7658,"options":7676,"isRSC":118},{"theme":7677,"sections":7678,"title":7684,"diagonalVariant":7685},"light-plain",[7679],{"text":7680,"quotes":7681},"\u003Ch3>\u003Cstrong>Visibility limitations beyond the IdP\u003C/strong>\u003C/h3>\u003Cp>Before Push, the security team relied on correlating data from their IdP and other tools to investigate potential threats. This process was time-consuming, and it often lacked the browser-level context needed to trace incidents back to their source.\u003C/p>\u003Cp>\"I didn't have visibility into the browser before, so there was no way for me to determine what actually happened or how it started,\" explained Alex. \"It's more like backwards tracing, rather than, ‘How did it happen?’\"\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>Validating hidden risks\u003C/strong>\u003C/h3>\u003Cp>Those limitations came into sharper focus when Cribl deployed Push. Early on, the team identified a misconfigured login page on a core business application that was still accessible, and in use.\u003C/p>\u003Cp>\"We found that a significant number of users were still logging in with just their username and password, bypassing SSO entirely,\" recalled Alex. \"Our team's diligence discovered this issue and, with the power of Push, addressed this hidden, previously unquantifiable risk.\"\u003C/p>\u003Cp>Equipped with this new telemetry, the team proactively reviewed login activity across other high-use apps. They discovered a similar misconfiguration on another widely used business platform, where password reuse and insecure login methods posed added risk. These discoveries confirmed what the team had long suspected, that some risks are only visible from inside the browser.\u003C/p>",[7682],{"quote":7683,"quoteBy":7580},"We found that a significant number of users were still logging in with just their username and password, bypassing SSO entirely. With the power of Push, we addressed this hidden, previously unquantifiable risk.","Technical Challenge","black-white",{"large":7687},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7689,"meta":7690,"component":7692,"responsiveStyles":7705},"builder-4c118b46a5a8450fa931b9eb5dd044af",{"previousId":7691},"builder-7de0aae035ff4029ab392358a324e878",{"name":7657,"tag":7658,"options":7693,"isRSC":118},{"theme":7660,"sections":7694,"title":7703,"diagonalVariant":7704},[7695,7700],{"text":7696,"quotes":7697},"\u003Cp>Cribl chose Push to build on their existing security strategy and extend protection into the browser, the control point where users interact with critical apps every day. Push’s browser extension gave the team real-time visibility into SaaS usage, authentication methods, and identity posture. Rather than introducing new overhead, Push enhanced the workflows the team already had in place.\u003C/p>\u003Ch3>\u003Cstrong>From manual triage to automated remediation \u003C/strong>\u003C/h3>\u003Cp>Initially, Cribl analysts manually triaged Push alerts. But as they operationalized the data, they began building their own automations, starting with a custom Slack bot that notifies employees about issues like password reuse, in line with Cribl’s culture of positive, proactive security engagement.\u003C/p>\u003Cp>This shift from manual investigation to structured automation saved the team hours of effort per incident.\u003C/p>\u003Cp>“Now we can focus our efforts elsewhere,” said Aaron.&nbsp;\u003C/p>\u003Cp>Push’s structured telemetry also gave the team the confidence to work cross-functionally, partnering with IT to deprecate risky login paths and fully enforce SSO where needed.\u003C/p>\u003Cp>Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps, risks that had previously gone unquantified.\u003C/p>",[7698],{"quote":7699,"quoteBy":7580},"The shift from manual investigation to structured automation saved the team hours of effort per incident.",{"text":7701,"quotes":7702},"\u003Ch3>\u003Cstrong>Integration spotlight\u003C/strong>\u003C/h3>\u003Cp>As the Cribl team operationalized Push’s browser-native telemetry, they found it incredibly useful for detection, enrichment, and investigation. So useful, in fact, that they built official Cribl packs to help other teams get the same benefits, without needing to write custom code.\u003C/p>\u003Cp>The result:\u003C/p>\u003Cul>\u003Cli>\u003Ca href=\"https://packs.cribl.io/packs/cc-push-security\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Stream Pack for Push\u003C/a>: Easily ingest, normalize, and route Push telemetry to your SIEM, SOAR, or data lake—while reducing event volume and cost.\u003C/li>\u003Cli>\u003Ca href=\"https://packs.cribl.io/packs/cc-search-push-security\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Search Pack for Push\u003C/a>: Pre-built dashboards for Push detections, posture, and browser activity, enabling faster investigation and historical analysis.\u003C/li>\u003C/ul>\u003Cp>Both are available via the \u003Ca href=\"https://packs.cribl.io/\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Dispensary\u003C/a>, and designed to help security teams operationalize browser-based detection and response with minimal effort.\u003C/p>\u003Cp>This native integration is part of Push’s broader strategy to work with the tools security teams already use, and get powerful telemetry into their hands, fast.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[],"Solution","white-black",{"large":7706},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":7707},"9px",{"@type":106,"@version":107,"id":7709,"meta":7710,"component":7712,"responsiveStyles":7716},"builder-98812dfd03154d1e93f8878686c5d57d",{"previousId":7711},"builder-2d869b1b36854de8b473c370c7afee8d",{"name":7713,"tag":7714,"options":7715,"isRSC":118},"CS Explore More","CustomerStoriesExploreMore",{},{"large":7717},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7719,"@type":106,"tagName":131,"properties":7720,"responsiveStyles":7721},"builder-pixel-dgvrqiocnh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7722},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7724},{"path":37,"query":7725},{},{},1764673427456,1763395528235,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbca4c4ff8c1a421fa199a6bf3dee17af",[],{"winningTest":118,"originalContentId":7732,"hasLinks":6,"lastPreviewUrl":7733,"kind":228,"breakpoints":7734,"hasAutosaves":6},"ceec2869ab5c44b9ac568ee6e09b5e5e","https://app.stg.pushsecurity.com/customer-stories/cribl?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=08b65992e49d4c2c9db231662879f089&builder.overrides.08b65992e49d4c2c9db231662879f089=08b65992e49d4c2c9db231662879f089&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"5sypzuej1ar",{"createdDate":7737,"id":7738,"name":7739,"modelId":7581,"published":13,"query":7740,"data":7742,"variations":7884,"lastUpdated":7885,"firstPublished":7886,"testRatio":33,"screenshot":7887,"createdBy":53,"lastUpdatedBy":72,"folders":7888,"meta":7889,"rev":7735},1759928101183,"9d3e1db8d71b44c097df0cecc0fca167","Inductive Automation",[7741],{"@type":162,"property":163,"operator":164,"value":48},{"themeId":6,"seoDescription":7743,"indexPageDescription":7592,"resourcesPageDescription":7743,"description":7743,"title":7590,"logo":7744,"resourcesPageTitle":7745,"indexPageDesciption":7592,"seoTitle":7745,"resourcesPageImage":7746,"blocks":7747,"url":48,"state":7881},"Why Inductive Automation chose Push Security. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdab2eea9bfa746bebd4ac559e93b532d","Customer Story: Inductive Automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe48cc549e10f4ef3811a6fd0dcb88957",[7748,7757,7788,7800,7814,7829,7837,7868,7876],{"@type":106,"@version":107,"id":7749,"meta":7750,"component":7752,"responsiveStyles":7755},"builder-ce3b478ca3d84bab908cb14ad7c1f4d1",{"previousId":7751},"builder-9116cb4244a0433a8a8a04902f1a247d",{"name":7601,"tag":7602,"options":7753,"isRSC":118},{"heroTitle":7745,"heroDescription":7754,"glowColor":7606,"heroLogo":7744},"\u003Cp>Inductive Automation, a software company for high-tech manufacturing, needed a way to reduce the security risks associated with unmanaged cloud identities, apps, and integrations.\u003C/p>",{"large":7756},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7758,"meta":7759,"component":7761,"responsiveStyles":7786},"builder-c6d6db7d467c40708cba33dea7daf2be",{"previousId":7760},"builder-48915b18a7ed4fc9a21ec0b2f7ffea58",{"name":7614,"tag":7615,"options":7762,"isRSC":118},{"summaryTitle":7763,"summaryDescription":7764,"summaryStat1":7765,"summaryStat2":7768,"summaryStat3":7772,"summaryStat4":7776,"stats":7781},"About Inductive Automation","\u003Cp>Inductive Automation,&nbsp;a software company for high-tech manufacturing, needed a way to reduce the security risks associated with unmanaged cloud identities, apps, and integrations.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Inductive Automation chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Push helped Inductive find and secure shadow accounts and apps with high-fidelity data that didn’t interfere with employees’ productivity.\u003C/li>\u003Cli>Inductive was able to consolidate tools with Push and close a gap in their identity security program, all while improving their return on investment in SSO and their password manager.\u003C/li>\u003Cli>Inductive got complete visibility across their SaaS identities, apps, and integrations, allowing them to consolidate tools and stop chasing false positives from previous solutions.\u003C/li>\u003C/ul>",{"icon":7766,"value":7767,"extraValueText":7624,"helpText":7621,"gap":118},"faUsers",360,{"icon":7769,"value":107,"extraValueText":37,"gap":7770,"helpText":7771},"faDollar",3,"Tools consolidated",{"icon":7623,"value":7773,"extraValueText":7774,"helpText":7775,"gap":33},5,"mins","Time to deploy",{"icon":7777,"value":7778,"extraValueText":7779,"helpText":7780},"faUserChart",99,"%","Uptake on deployment",[7782,7783,7784,7785],{"formatValue":41,"icon":7766,"value":7767,"gap":33,"extraValueText":7624,"helpText":7621},{"formatValue":41,"icon":7769,"value":107,"gap":118,"extraValueText":37,"helpText":7771},{"formatValue":41,"icon":7623,"value":7773,"gap":33,"extraValueText":7774,"helpText":7775},{"formatValue":41,"icon":7777,"value":7778,"gap":33,"extraValueText":7779,"helpText":7780},{"large":7787},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7789,"meta":7790,"component":7792,"responsiveStyles":7798},"builder-0801e2e4d31d4ba18490d1d2c4798ebb",{"previousId":7791},"builder-da89546ce7e349818e03a7da8bc8a778",{"name":7642,"tag":7643,"options":7793,"isRSC":118},{"quoteCarousel":7794},[7795],{"author":27,"jobTitle":7796,"quote":7797},"Chief Information Security Officer, Inductive Automation","\u003Cp>With Push, we loved the UI/UX and we loved the founders’ vision. We got a tool that was better quality and we reduced another vendor, so that’s always a win.\u003C/p>",{"large":7799},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7801,"meta":7802,"component":7804,"responsiveStyles":7812},"builder-8f8905bcdee541acb28b223c64cff2bb",{"previousId":7803},"builder-ed504b3dd2c2473e9f977a455c82f267",{"name":7657,"tag":7658,"options":7805,"isRSC":118},{"theme":7660,"sections":7806,"title":7667,"diagonalVariant":7668},[7807],{"text":7808,"quotes":7809},"\u003Cp>As the software partner to critical industries in 100 countries, including nuclear power, water systems, pharmaceutical manufacturing and data centers, Inductive Automation deeply values security.&nbsp;\u003C/p>\u003Cp>Over the past decade, Inductive has built a security team that prioritizes nimble solutions to complex problems while supporting a business that has scaled rapidly, with 30 percent growth year-over-year for multiple years. Inductive’s workforce is also highly skilled, with about 70 percent of the company in technical roles.\u003C/p>\u003Cp>To secure identities and apps in the cloud, Inductive needed an approach that would not disrupt their velocity while also closing the security gaps for a long tail of powerful apps and integrations.\u003C/p>",[7810],{"quote":7811,"quoteBy":7739},"An issue with our software could cause downstream effects that have massive ramifications.",{"large":7813},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7815,"meta":7816,"component":7818,"responsiveStyles":7827},"builder-ddb6030401ab4311b8ce1bc5abdde4fc",{"previousId":7817},"builder-6db6a18a48334bb6b91dbd6c5e19342d",{"name":7657,"tag":7658,"options":7819,"isRSC":118},{"theme":7677,"sections":7820,"title":7826,"diagonalVariant":7685},[7821],{"text":7822,"quotes":7823},"\u003Cp>With a strong strategy around centralizing identity via SSO, Inductive’s security team were paying close attention to the explosion of third-party apps and integrations that could access critical business systems and data while flying under the radar.\u003C/p>\u003Cp>I was always worried about the gaps, like what about the apps that don’t have SSO or don’t have MFA?” Jason said. “Everything, every major breach you read of, goes back to identity in some way. So protecting those identities is just like a foundational component of a modern security program. You can’t protect what you don’t know. So if you have people spinning up apps with weak passwords and no MFA, and you don’t even know that app exists. I mean, it’s just a massive potential issue for you.\"\u003C/p>\u003Cp>With Inductive’s culture of experimentation and innovation, the security team embraces a “guardrails, not gates” approach. So legacy cloud access security broker (CASB) solutions were a poor fit for multiple reasons.\u003C/p>\u003Cp>“So we really wanted to wrap our heads around what people were doing in a way that wasn’t heavy and draconian,” Jason said. “We didn’t want to proxy all traffic and decrypt it all and break sessions. And, you know, weaken some of the fundamental security of internet browsing so we could get that visibility and then cause performance impacts as a result.”\u003C/p>\u003Cp>Other market solutions were so niche, they only tackled part of the problem, and for a while, Waits’ team used two tools in order to manage OAuth apps and to find and secure shadow SaaS and accounts.\u003C/p>\u003Cp>But the solutions didn’t “spark joy,” he said. They relied on data sources like email that were prone to false positives — what Jason calls “chasing ghosts.”\u003C/p>\u003Cp>They started looking for a modern solution that could validate their security controls across a portfolio of managed apps while finding and fixing issues on the unmanaged ones, too.\u003C/p>\u003Cp>“We were trying to look at the lightest way we could get that visibility, and wrap our heads around this problem in a way that's very user-friendly,” he said. \u003C/p>",[7824],{"quote":7825,"quoteBy":7739},"\u003Cp>We didn’t want to proxy all traffic and decrypt it all and break sessions. And, you know, weaken some of the fundamental security of internet browsing so we could get that visibility and then cause performance impacts as a result.\u003C/p>","Technical challenge",{"large":7828},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7830,"meta":7831,"component":7832,"responsiveStyles":7835},"builder-9599d92cf81b4ecc944727ae0fa96b4e",{"previousId":2265},{"name":533,"tag":533,"options":7833,"isRSC":118},{"description":7834},"\u003Cp>Modern phishing has changed a lot in the past decade or so. MFA-bypassing&nbsp;Attacker-in-the-Middle (AitM) kits are table stakes — anyone can pick up a copy of Evilginx and immediately blow past most email and network security solutions on the market.&nbsp;&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>But the most sophisticated attacks — the ones that usually hit the headlines in the form of major breaches — are doing much more than this. The latest generation of fully customized AitM phishing kits are dynamically obfuscating the code that loads the web page, implementing bot protection through custom CAPTCHA, and using runtime anti-analysis features, making them increasingly difficult to detect by the tools most enterprises are using to combat the problem.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(249, 173, 44);\">Read our analysis of how modern phishing tools and techniques have changed the game — and what security teams can do to level the playing field.  \u003C/strong>\u003C/p>",{"large":7836},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7838,"meta":7839,"component":7841,"responsiveStyles":7866},"builder-e702b1bf1c7248a19f9edb3b157481c2",{"previousId":7840},"builder-ffdb35908521490b84d21cd36c87f29d",{"name":7657,"tag":7658,"options":7842,"isRSC":118},{"theme":7660,"sections":7843,"title":7703,"diagonalVariant":7704},[7844,7849,7852,7855,7858,7861],{"text":7845,"quotes":7846},"\u003Cp>Inductive chose Push after a competitive vendor review. With Push, the Inductive team was able to get rid of two other security tools, saving budget and time. With high-fidelity data from Push’s browser activity detection approach, they now confidently rely on Push as the source of truth for their cloud app portfolio.\u003C/p>\u003Cp>“We’re not mandated to do a bunch of bogus compliance stuff. So we don’t buy tools to check boxes. Everything we do, we do it to solve a problem,” Jason said. “But the whole ‘Does it spark joy?’ is my benchmark. So with Push, we loved the UI/UX and we loved the founders’ vision. We got a tool that was better quality and we reduced another vendor, so that’s always a win.”\u003C/p>",[7847],{"quote":7848,"quoteBy":7739},"We got a tool that was better quality and we reduced another vendor, so that’s always a win.",{"text":7850,"quotes":7851},"\u003Ch3>Broad visibility across apps and OAuth integrations\u003C/h3>\u003Cp>By providing broader visibility with more accurate data across cloud identity, third-party cloud apps, and OAuth integrations, Push helps Inductive get a complete picture of their ecosystem.&nbsp;\u003C/p>\u003Cp>Push helped Inductive find and secure apps used only in pockets of the organization and get them managed centrally.\u003C/p>",[],{"text":7853,"quotes":7854},"\u003Ch3>Automated remediation\u003C/h3>\u003Cp>“Automation is in our name,” said Jason, so Push’s automated remediation workflows were a huge draw.&nbsp;\u003C/p>\u003Cp>Push’s use of a Slackbot to directly engage end-users to help them make simple but meaningful security improvements was a perfect fit for Inductive’s culture. This approach offloads Inductive’s security team while also being more effective: “It’s not someone from the security team reaching out and saying, ‘Hey, what are you doing?!’ It feels less accusatory if it’s a Slackbot,” Jason said. It’s also a much more scalable solution for their 4-person team.\u003C/p>",[],{"text":7856,"quotes":7857},"\u003Ch3>Easy deployment\u003C/h3>\u003Cp>With Inductive’s managed Chrome browser program, they were able to deploy the Push browser extension to 99 percent of their devices in 5 minutes in the middle of a regular workday. The deployment was so seamless that they received no help desk requests, Jason said.\u003C/p>",[],{"text":7859,"quotes":7860},"\u003Ch3>Return on investment\u003C/h3>\u003Cp>Push also helps Inductive improve their return on investment in a recent migration to a new enterprise password manager and an ongoing emphasis on centrally managing apps via SSO. They use Push’s detection of shadow apps and accounts, as well as its password manager detection capabilities, to close the gaps they find.\u003C/p>",[],{"text":7862,"quotes":7863},"\u003Ch3>A foundational source of truth\u003C/h3>\u003Cp>Push has become a trusted source of truth for Inductive’s cloud portfolio, providing the foundation for their vendor risk management program.\u003C/p>\u003Cp>“We have a cybersecurity strategy we’re implementing company-wide with a big identity component. So being able to validate that is just super critical. Otherwise it’s all a paper policy,” Jason said. “We don’t like to say we’re going to do something. We like to do it and&nbsp;validate&nbsp;that we are doing it. It only takes one little incident, one little crack, so staying on top of this is just really important for us.”\u003C/p>",[7864],{"quote":7865,"quoteBy":7739},"We have a cybersecurity strategy we’re implementing company-wide with a big identity component. So being able to validate that is just super critical. Otherwise it’s all a paper policy.",{"large":7867},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7869,"meta":7870,"component":7872,"responsiveStyles":7874},"builder-1d0bbf6cc53e4641b5fee22e518bf8e9",{"previousId":7871},"builder-cb724ebb498e4d0c811fad38906e9ab7",{"name":7713,"tag":7714,"options":7873,"isRSC":118},{},{"large":7875},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":7877,"@type":106,"tagName":131,"properties":7878,"responsiveStyles":7879},"builder-pixel-h5x0avfjkrk",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":7880},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":7882},{"path":37,"query":7883},{},{},1764673408653,1760696983767,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffd740e1fb14b4218a5c28b23f3d328d3",[],{"hasLinks":6,"lastPreviewUrl":7890,"originalContentId":7732,"breakpoints":7891,"kind":228,"winningTest":118,"hasAutosaves":6},"https://app.stg.pushsecurity.com/customer-stories/inductive-automation?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=9d3e1db8d71b44c097df0cecc0fca167&builder.overrides.9d3e1db8d71b44c097df0cecc0fca167=9d3e1db8d71b44c097df0cecc0fca167&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":7893,"id":7894,"name":7895,"modelId":7581,"published":13,"query":7896,"data":7899,"variations":8020,"lastUpdated":8021,"firstPublished":8022,"testRatio":33,"screenshot":8023,"createdBy":53,"lastUpdatedBy":72,"folders":8024,"meta":8025,"rev":7735},1754571334372,"3d9a9922aa394c27b2847b3fd7101841","Upvest",[7897],{"@type":162,"property":163,"operator":164,"value":7898},"/customer-stories/upvest",{"seoTitle":7900,"seoDescription":7901,"indexPageDescription":7902,"title":7903,"logo":7904,"themeId":6,"resourcesPageDescription":7901,"indexPageDesciption":7905,"description":7901,"resourcesPageTitle":7900,"resourcesPageImage":7906,"blocks":7907,"url":7898,"state":8017},"Customer Story: Upvest","Why Upvest chose Push Security.","Upvest partnered with Push to achieve a scalable and  user-centric way to secure SaaS apps and reduce third-party risks across a complex ecosystem of integrations  and apps.","upvest","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F07979505bdc841c3b807c4355147a770","Upvest partnered with  Push to achieve a scalable and  user-centric way to secure SaaS apps and reduce third-party risks across a complex ecosystem of integrations  and apps.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1e030d40870f4ac0917f0cf7c166a441",[7908,7914,7940,7950,7961,7980,8007,8012],{"@type":106,"@version":107,"id":7751,"component":7909,"responsiveStyles":7912},{"name":7601,"tag":7602,"options":7910,"isRSC":118},{"heroTitle":7900,"heroDescription":7911,"heroLogo":7904,"glowColor":7606},"\u003Cp>Upvest, a cloud-native German fintech, needed a scalable and user-centric way to secure SaaS apps and reduce third-party risks from a complex ecosystem of OAuth integrations.\u003C/p>",{"large":7913},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7760,"component":7915,"responsiveStyles":7938},{"name":7614,"tag":7615,"options":7916,"isRSC":118},{"summaryTitle":7917,"summaryDescription":7918,"summaryStat1":7919,"summaryStat2":7921,"summaryStat3":7925,"summaryStat4":7929,"stats":7931},"About Upvest","\u003Cp>Upvest is a financial technology startup that provides Investment API infrastructure to financial organizations and neobanks. Upvest is headquartered in Berlin, Germany, and was founded in 2017.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Upvest chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Upvest, a fintech company that provides investment infrastructure to financial organizations, needed a way to secure the cloud identities, apps, and third-party integrations that make up their core infrastructure as a SaaS-first organization.\u003C/li>\u003Cli>Push helped Upvest get high-fidelity data on their SaaS estate while engaging with users directly in the browser to guide their security choices.\u003C/li>\u003Cli>Upvest now has a unique source of telemetry to use for automating the management of SaaS and identifying security issues.\u003C/li>\u003C/ul>",{"icon":7766,"value":7920,"extraValueText":7624,"helpText":7621,"gap":118},180,{"icon":7922,"value":33,"extraValueText":7923,"gap":7770,"helpText":7924},"faClock","hour","Proof of concept setup",{"icon":7926,"value":7927,"extraValueText":37,"helpText":7928},"faEarth",2017,"Founded in Berlin, Germany",{"icon":7354,"value":7770,"extraValueText":7624,"helpText":7930},"Regulations complied with",[7932,7935,7936],{"formatValue":6,"icon":7630,"value":7933,"gap":462,"extraValueText":37,"helpText":7934},2022,"Protected by Push since 2022",{"formatValue":41,"icon":7766,"value":7920,"gap":462,"extraValueText":7624,"helpText":7621},{"formatValue":41,"icon":7922,"value":33,"gap":7937,"extraValueText":7923,"helpText":7924},4,{"large":7939},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7791,"component":7941,"responsiveStyles":7948},{"name":7642,"tag":7643,"options":7942,"isRSC":118},{"quoteCarousel":7943},[7944],{"author":7945,"jobTitle":7946,"quote":7947},"Sebastien Jeanquier","Chief Security Officer","\u003Cp>Being a regulated entity, we need to have considered everything from a regulatory standpoint, a compliance standpoint, a pure security standpoint, and a data protection standpoint... this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.\u003C/p>",{"large":7949},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7803,"component":7951,"responsiveStyles":7959},{"name":7657,"tag":7658,"options":7952,"isRSC":118},{"theme":7660,"sections":7953,"title":7667,"diagonalVariant":7668},[7954],{"text":7955,"quotes":7956},"\u003Cp>Operating in the highly regulated German financial services environment, Upvest has carefully built a culture of security throughout its workforce.\u003C/p>\u003Cp>“Security is all of our responsibility and we democratize it to every department in the company,” explains Sebastien Jeanquier, chief security officer at Upvest.\u003C/p>\u003Cp>When Jeanquier joined the financial technology startup five years ago with a background in security consulting and penetration testing, he had a rare opportunity to build a security program from the ground up based on what he’d learned from years of red teaming.\u003C/p>\u003Cp>“I really wanted to move somewhere where I was going to be able to build as greenfield as possible to take what I saw as the best practices from every security domain,” he says.\u003C/p>\u003Cp>As a cloud-native company, Upvest must demonstrate security mastery of its entire cloud ecosystem in order to meet internal requirements and regulatory standards. In seeking out a tool to secure cloud apps and identities, Upvest needed a solution that would meet its high standards and fit its user-centric culture.\u003C/p>",[7957],{"quote":7958,"quoteBy":7895},"Security is all of our responsibility and we democratize it to every department in the company.",{"large":7960},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7817,"component":7962,"responsiveStyles":7978},{"name":7657,"tag":7658,"options":7963,"isRSC":118},{"theme":7677,"sections":7964,"title":7826},[7965,7970,7975],{"text":7966,"quotes":7967},"\u003Ch3>\u003Cstrong>Meeting a high bar for security and regulatory compliance\u003C/strong>\u003C/h3>\u003Cp>Operating in Germany and the EU, Upvest holds multiple banking licenses with BaFin, Germany’s financial regulator, and is bound to Germany’s strict privacy standards, in addition to GDPR, so finding technical solutions that support these regulations is paramount.\u003C/p>\u003Cp>“Our original product was in the blockchain space. We’ve since pivoted into the more traditional finance space. But if anything, our security requirements and our compliance and regulatory controls actually have only gone up,” Jeanquier explains.\u003C/p>\u003Cp>For Upvest’s security team, a top-of-mind goal was how to get their arms around the full portfolio of cloud identities, SaaS apps, and OAuth integrations that represented core business assets.\u003C/p>\u003Cp>“Being a regulated entity, it means that we need to be able to demonstrate the fact that we have considered everything from a regulatory standpoint, a compliance standpoint, a pure security standpoint, and a data protection standpoint,” says Jeanquier. “And so shadow IT is something that we were keen to get ahead of. We’re SaaS native. We don’t have any other applications internally. And so this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.”\u003C/p>",[7968],{"quote":7969,"quoteBy":7895},"We’re SaaS native. We don’t have any other applications internally. And so this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.",{"text":7971,"quotes":7972},"\u003Ch3>\u003Cstrong>Challenge of managing third-party integrations\u003C/strong>\u003C/h3>\u003Cp>The Upvest team was particularly concerned about the potential for a fast-growing tangle of OAuth integrations. They had been looking for solutions that would allow them to quickly see and take action on these third-party app integrations.\u003C/p>\u003Cp>“Any user can go to pretty much any service and grant it access into your environment,” Jeanquier says. “And unless you’re keeping tabs on it, it’s very easy for some really small application run by three people somewhere to just request excessive access. It's that supply chain risk that could end up resulting in a lot more compromises than we would otherwise see if we were being attacked directly.”\u003C/p>\u003Cp>The Upvest security team was also focused on finding and securing any non-SSO identities in their environment, which could pose a significant risk if an offboarded employee retained access to business systems or data.\u003C/p>\u003Cp>The team quickly found that existing tools such as Google Workspace weren’t purpose-built for the kind of context and scalability they needed in order to make efficient and informed security decisions about their SaaS accounts and third-party integrations.\u003C/p>\u003Cp>“We could have dug down and written some custom tooling to try and identify what's being used by whom, and doing a regular batch job of trying to identify what they're doing,” says Jeanquier. “But I didn’t really see any good solution for tackling this at scale.”\u003C/p>",[7973],{"quote":7974,"quoteBy":7895},"Unless you’re keeping tabs on it, it’s very easy for some really small application run by three people somewhere to just request excessive access. It's that supply chain risk that could end up resulting in a lot more compromises.",{"text":7976,"quotes":7977},"\u003Ch3>\u003Cstrong>Desire to preserve a positive security culture\u003C/strong>\u003C/h3>\u003Cp>The team also needed a solution that would fit their company culture. They didn’t want to limit the possibilities for employee innovation by outright blocking access to apps and integrations.\u003C/p>\u003Cp>But they needed to be able to monitor for excessively permissioned, untrustworthy apps and remove them — while communicating security best practices to employees.\u003C/p>\u003Cp>“It’s really about trying to engender as much as possible that culture of awareness,” Jeanquier says. “Awareness not just for our end-users, but also for us as a team across both security and IT, and trying to encourage as much as possible our processes to be followed.”\u003C/p>",[],{"large":7979},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7840,"component":7981,"responsiveStyles":8005},{"name":7657,"tag":7658,"options":7982,"isRSC":118},{"theme":7660,"sections":7983,"title":7703},[7984,7987,7992,7995,8000],{"text":7985,"quotes":7986},"\u003Cp>Upvest chose Push because the product provided a unique browser agent-based approach to solving the problem of shadow SaaS and identities, while also aligning strongly with Upvest’s security culture.\u003C/p>\u003Cp>As an early customer, Jeanquier also embraced the opportunity to provide input on product direction and use cases.\u003C/p>\u003Cp>“We very much shared the vision of what it is we were trying to tackle in terms of a security challenge in the modern-day SaaS world,” he says.\u003C/p>",[],{"text":7988,"quotes":7989},"\u003Ch3>\u003Cstrong>Meeting employees where they work\u003C/strong>\u003C/h3>\u003Cp>With Push, the Upvest security team was able to maintain their user-centric approach to security by getting the rich contextual information they needed on the apps, accounts, and third-party OAuth integrations being used across their workforce — without having to resort to outright blocking.\u003C/p>\u003Cp>Push’s guardrails features, including the ability to communicate security policy directly with employees using&nbsp;that appear in the browser, were a perfect fit for Upvest. These messages help reinforce security policy and prompt secure behavior right at the point of access: The app signup or login screens.\u003C/p>\u003Cp>“You can write as much policy as you want, but ultimately users are going to jump over the lowest hurdle,” Jeanquier says. “The Push browser extension gives you a seat on the user's side where you can start to enforce some of these best practices.”\u003C/p>",[7990],{"quote":7991,"quoteBy":7895},"You can write as much policy as you want, but ultimately users are going to jump over the lowest hurdle. Push gives you a seat on the user's side where you can start to enforce some of these best practices.",{"text":7993,"quotes":7994},"\u003Ch3>\u003Cstrong>A scalable way to meet regulatory requirements\u003C/strong>\u003C/h3>\u003Cp>To balance Upvest’s user-centric security culture with their stringent regulatory requirements, they also needed a scalable way to reliably identify and review every cloud app used across the business — without getting in employees’ way.\u003C/p>\u003Cp>Push provides them with insights into not just which apps and integrations are being used, but also the specific details about which users, which accounts, which login methods, and how recently a login was observed. This context allows Upvest to quickly act on newly adopted apps that aren’t approved for use, and to have a complete picture of their estate when performing app reviews to meet compliance standards.\u003C/p>\u003Cp>“Because of the regulatory landscape, it won’t fly for you to suddenly decide that you want to use a specific file-sharing app for something. And that you just go and log in and start using that for company data,” Jeanquier says. “The regulatory requirements mandate that we have assessed every app from the perspective of data protection, confidentiality requirements, assessed the vendor themselves, and so on.”\u003C/p>",[],{"text":7996,"quotes":7997},"\u003Ch3>\u003Cstrong>Shedding light on shadow IT and non-SSO identities\u003C/strong>\u003C/h3>\u003Cp>Push’s use of a browser agent was also a key differentiator for Upvest because the approach provides a high-fidelity source of information.\u003C/p>\u003Cp>“From my perspective, I think a lot of value comes from the browser extension. There is a lot that you can do both in terms of passive guardrailing as well as active education that can only happen at the browser level.”\u003C/p>\u003Cp>Upvest was able to monitor employee SaaS account creation and logins in real time and identify apps in use across the business that were not approved or had not been reviewed by the security team. The Push browser agent also supplied the login methods used to access these accounts, so that the Upvest team could track their SSO coverage and identify non-SSO apps. This was information they otherwise had no way of collecting.\u003C/p>",[7998],{"quote":7999,"quoteBy":7895},"Because of the regulatory landscape, it won’t fly for you to suddenly decide that you want to use a specific file-sharing app for something.",{"text":8001,"quotes":8002},"\u003Ch3>\u003Cstrong>Essential building block for security operations\u003C/strong>\u003C/h3>\u003Cp>With a focus on agility and efficiency, the Upvest security team also sees the telemetry provided by Push as a valuable input to their security operations and automation efforts.\u003C/p>\u003Cp>They are currently exploring how to use Push’s&nbsp;REST API and webhooks&nbsp;to build detections for security incidents and to automate basic SaaS and account management tasks.\u003C/p>\u003Cp>“Push is uniquely positioned to be able to expose certain actions and practices to us as a team which could then allow us to say, okay on the basis of this particular type of action which we consider to be a very strong signal, let us know and we’ll do something off the back of that using some automated workflows,” explains Jeanquier.\u003C/p>\u003Cp>“This kind of automated security orchestration is the way forward with regards to orchestrating very specific and rapid responses to very clear-cut security signals.”\u003C/p>",[8003],{"quote":8004,"quoteBy":7895},"This kind of automated security orchestration is the way forward with regards to orchestrating very specific and rapid responses to very clear-cut security signals.",{"large":8006},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7871,"component":8008,"responsiveStyles":8010},{"name":7713,"tag":7714,"options":8009,"isRSC":118},{},{"large":8011},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":8013,"@type":106,"tagName":131,"properties":8014,"responsiveStyles":8015},"builder-pixel-uwv8wqe4z2",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":8016},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":8018},{"path":37,"query":8019},{},{},1764673376391,1754571937914,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F17710b7416ff49c59d08560c9aabb2c3",[],{"lastPreviewUrl":8026,"breakpoints":8027,"kind":228,"hasLinks":6,"hasAutosaves":6},"https://app.stg.pushsecurity.com/customer-stories/upvest?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=3d9a9922aa394c27b2847b3fd7101841&builder.overrides.3d9a9922aa394c27b2847b3fd7101841=3d9a9922aa394c27b2847b3fd7101841&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":8029,"id":7732,"name":8030,"modelId":7581,"published":13,"query":8031,"data":8034,"variations":8134,"lastUpdated":8135,"firstPublished":8136,"testRatio":33,"screenshot":8137,"createdBy":53,"lastUpdatedBy":72,"folders":8138,"meta":8139,"rev":7735},1749126907543,"Convex",[8032],{"@type":162,"property":163,"operator":164,"value":8033},"/customer-stories/convex",{"themeId":6,"indexPageDescription":8035,"resourcesPageDescription":8036,"seoTitle":8037,"seoDescription":8036,"logo":8038,"indexPageDesciption":7592,"description":8036,"resourcesPageTitle":8037,"title":7590,"resourcesPageImage":8039,"blocks":8040,"url":8033,"state":8131},"Convex Insurance chose Push to close the gap left by traditional CASB solutions, enabling them to enhance their identity security and gain control of shadow SaaS at the same time.","Why Convex Insurance chose Push Security. ","Customer Story: Convex Insurance","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F25b3ec2a3c714329a945a4701bf15bae","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F46b15e4e61394b28963f940a70f7259c",[8041,8047,8066,8076,8088,8099,8121,8126],{"@type":106,"@version":107,"id":7599,"component":8042,"responsiveStyles":8045},{"name":7601,"tag":7602,"options":8043,"isRSC":118},{"heroTitle":8037,"heroDescription":8044,"heroLogo":8038,"glowColor":7606},"\u003Cp>Convex Insurance chose Push to close the gap left by traditional CASB solutions, enabling them to enhance their identity security and gain control of shadow SaaS at the same time.\u003C/p>",{"large":8046},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7612,"component":8048,"responsiveStyles":8064},{"name":7614,"tag":7615,"options":8049,"isRSC":118},{"summaryTitle":8050,"summaryDescription":8051,"summaryStat1":8052,"summaryStat2":8055,"summaryStat3":8056,"summaryStat4":8058,"stats":8060},"About Convex Insurance","\u003Cp>Convex Insurance is an international specialty insurer founded in 2019 and operating in Bermuda, London, and Luxembourg. Convex provides underwriting for complex specialty risks, including in the areas of energy, commercial property, crisis management, and aerospace.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Convex chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Convex Insurance, an international specialty insurer, needed a way to secure identities on cloud apps — including apps not on SSO.\u003C/li>\u003Cli>Push helped Convex get a unified view across both their identity security posture and their estate of third-party apps and OAuth integrations.\u003C/li>\u003Cli>Convex was able to get reliable data in order to put further weight behind their security policies. The security team was also able to use Push’s automated self-remediation ChatOps workflows to reduce the manual effort of fixing issues.\u003C/li>\u003C/ul>",{"icon":7354,"value":8053,"gap":118,"extraValueText":7624,"helpText":8054},1000,"Number of apps",{"icon":7922,"value":33,"gap":7770,"extraValueText":7923,"helpText":7924},{"icon":7926,"value":7770,"extraValueText":7624,"helpText":8057},"Locations protected",{"icon":7354,"value":8059,"extraValueText":37,"helpText":7621},1750,[8061,8062,8063],{"icon":7354,"value":8053,"extraValueText":7624,"helpText":8054,"formatValue":41},{"icon":7922,"value":33,"extraValueText":7923,"helpText":7924,"formatValue":41,"gap":107},{"icon":7354,"value":8059,"extraValueText":37,"helpText":7621,"formatValue":41,"gap":462},{"large":8065},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7640,"component":8067,"responsiveStyles":8074},{"name":7642,"tag":7643,"options":8068,"isRSC":118},{"quoteCarousel":8069},[8070],{"author":8071,"jobTitle":8072,"quote":8073},"Michael Earl","Security Operations Lead","\u003Cp>With Push, suddenly we had the potential of installing something into our estate that would give us even better information to make decisions about our SaaS and identity security posture so we could get a unified picture of the risks.\u003C/p>",{"large":8075},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7655,"component":8077,"responsiveStyles":8086},{"name":7657,"tag":7658,"options":8078,"isRSC":118},{"theme":7660,"sections":8079,"title":7667,"diagonalVariant":7668},[8080],{"text":8081,"quotes":8082},"\u003Cp>As a specialty insurer handling complex requirements, Convex Insurance relies on security solutions that provide the flexibility their workforce needs in order to deliver services in areas as diverse as crisis management, marine cargo, renewable energy, and satellite launches in multiple countries and territories.\u003C/p>\u003Cp>“At Convex, we embrace the role that our staff play in helping secure the business and we empower them to make good decisions while providing them with the information they need to do that,” says Michael Earl, security operations lead at Convex.\u003C/p>\u003Cp>Convex has also welcomed the use of cloud apps to supercharge productivity, with employees using a large number of SaaS apps, from the mundane to the obscure.&nbsp;\u003C/p>\u003Cp>However, the widespread use of cloud apps posed a challenge for the Convex security team in getting a unified view across their app estate and identity posture. Existing tools provided a lot of data, but it was a time-consuming process to glean the insights the team needed to effectively enforce security policies.\u003C/p>\u003Cp>The potential blindspot of unmanaged apps and identities was a concern and led to hard conversations among the security team.\u003C/p>",[8083],{"quote":8084,"quoteBy":8085},"If we have a breach at a third party that some of our users are signed up to, we need to immediately understand where we have accounts and data so we can take appropriate steps.","Convex Insurance",{"large":8087},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7674,"component":8089,"responsiveStyles":8097},{"name":7657,"tag":7658,"options":8090,"isRSC":118},{"theme":7677,"sections":8091,"title":7684,"diagonalVariant":7685},[8092],{"text":8093,"quotes":8094},"\u003Ch3>\u003Cstrong>CASB approach was time-consuming\u003C/strong>\u003C/h3>\u003Cp>Early attempts to solve the challenge of getting full visibility of both identity posture and their app estate were time-consuming.\u003C/p>\u003Cp>This entailed combing through CASB logs to identify visited URLs and HTTP methods, as well as evidence of POST data and transferred bytes. Then the security team would try to infer if employees were using unsanctioned applications or storing data where it wasn’t approved to go. “It was quite a manual exercise,” Michael says.&nbsp;\u003C/p>\u003Cp>That spotty evidence made it hard for the security team to have informed conversations with end-users.&nbsp;\u003C/p>\u003Cp>“When you have a conversation with an employee, you want to make sure you have the proper information on whether they were actually using an app so you don’t put someone on the defensive when they were just doing their job,” Michael says.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>Seeking visibility of non-SSO cloud identities\u003C/strong>\u003C/h3>\u003Cp>At the same time, the team was looking for additional ways to get the visibility they needed for securing non-SSO cloud identities. In particular, they were worried about identities that could exist on unmanaged apps.\u003C/p>\u003Cp>“In our industry, it is the SaaS apps that are not SSO-integrated that are potentially the biggest danger,” says Alistair McGlinchy, IT security engineer at Convex.\u003C/p>\u003Cp>“So if a third party has their password database attacked and there has been any password reuse, an attacker can password-spray and get to the point where MFA is the only blocker for somebody trying to authenticate.”\u003C/p>",[8095],{"quote":8096,"quoteBy":8085},"In our industry, it is the SaaS apps that are not SSO-integrated that are potentially the biggest danger.",{"large":8098},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7691,"component":8100,"responsiveStyles":8119},{"name":7657,"tag":7658,"options":8101,"isRSC":118},{"theme":7660,"sections":8102,"title":7703,"diagonalVariant":7704},[8103,8108,8111,8116],{"text":8104,"quotes":8105},"\u003Cp>Convex chose Push initially to help them further secure identities on a large catalog of cloud apps. In learning more about the product, they realized Push would also give them a unique unified view of both identity posture and their third-party apps and OAuth integrations — even unsanctioned or “shadow” apps.\u003C/p>\u003Cp>“Other than you guys, we just didn’t have any awareness of anything in the market that matched the level of intelligence that Push can provide about how our employees use passwords,” Michael says. “ And then we learned about all the additional features, like you can see where all of your apps are integrated and what people are doing with them.\u003C/p>\u003Cp>You’ve got this nice unified view of all of the OAuth scopes and things that people have been granting. The product works. It ticks all the boxes, really.”\u003C/p>",[8106],{"quote":8107,"quoteBy":8085},"The product works. It ticks all the boxes, really.",{"text":8109,"quotes":8110},"\u003Ch3>\u003Cstrong>Easy deployment\u003C/strong>\u003C/h3>\u003Cp>Setting up a proof of concept was a 1-hour video call, Alistair recalls.&nbsp;\u003C/p>\u003Cp>“It was one of the more straightforward onboarding and trial experiences that we’ve had, and that’s continued post-procurement as well,” Michael says.\u003C/p>\u003Cp>The team was able to select a test group and deploy the Push browser extension via MDM. The Convex team also appreciated Push’s support for Google Workspace and alternative identity providers.\u003C/p>",[],{"text":8112,"quotes":8113},"\u003Ch3>\u003Cstrong>Immediate value\u003C/strong>\u003C/h3>\u003Cp>During the trial, the security team found high-risk password reuse among their own IT team.\u003C/p>\u003Cp>Armed with this information, they could follow up with employees directly — or use Push’s automated self-remediation ChatOps workflows to facilitate that conversation without it feeling awkward for either party.\u003C/p>\u003Cp>“As far as we’re concerned, it is better coming from an automated platform,” Michael says. “We’re a small team, so we don’t have a lot of time to manually follow up on every possible issue. We absolutely need tools that both detect and notify about the problem and facilitate the remediation steps.”\u003C/p>\u003Cp>They were also able to identify non-SSO apps with heavy usage and restrict their use, as well as gauge their employees’ use of AI and LLM tools.\u003C/p>",[8114],{"quote":8115,"quoteBy":8085},"It was one of the more straightforward onboarding and trial experiences that we’ve had, and that’s continued post-procurement as well.",{"text":8117,"quotes":8118},"\u003Ch3>\u003Cstrong>Putting more weight behind security policies\u003C/strong>\u003C/h3>\u003Cp>With the data provided by the Push platform, the Convex security team now has the evidence they need to be able to reinforce security policies for their cloud estate.\u003C/p>\u003Cp>“It gives us all the information that we need to attack the problem and provide even better security for our business,” Michael says.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[],{"large":8120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":7711,"component":8122,"responsiveStyles":8124},{"name":7713,"tag":7714,"options":8123,"isRSC":118},{},{"large":8125},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":8127,"@type":106,"tagName":131,"properties":8128,"responsiveStyles":8129},"builder-pixel-4o1xy772lk3",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":8130},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":8132},{"path":37,"query":8133},{},{},1764673394915,1749126936428,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F10953d20c9db4987ac26800a13bcbf48",[],{"breakpoints":8140,"hasLinks":6,"lastPreviewUrl":8141,"kind":228,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://app.stg.pushsecurity.com/customer-stories/convex?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=ceec2869ab5c44b9ac568ee6e09b5e5e&builder.overrides.ceec2869ab5c44b9ac568ee6e09b5e5e=ceec2869ab5c44b9ac568ee6e09b5e5e&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",[8143,8160,8175,8189,8203,8217],{"query":8144,"folders":8145,"createdDate":8146,"id":8147,"name":8148,"modelId":8149,"published":13,"meta":8150,"data":8152,"variations":8155,"lastUpdated":8156,"firstPublished":8157,"testRatio":33,"createdBy":8158,"lastUpdatedBy":34,"rev":8159},[],[],1736420708807,"3ee05e35550c414eb6e2e7a59feb735a","Evilginx demo video","b7bf3d70e78446bd9715b13e5771cdd0",{"lastPreviewUrl":37,"breakpoints":8151,"kind":36},{"small":39,"medium":40},{"type":4215,"video":8153,"poster":8154},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4ffec79894f942d682dea64f83bfea76%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=4ffec79894f942d682dea64f83bfea76&alt=media&optimized=true","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8a940a6665be4b47997f9d2597b6050d",{},1738139717436,1736422351787,"RKRZuHPG0NX7u5xikqfxL9BxQwg2","znvm5cddxc",{"query":8161,"folders":8162,"createdDate":8163,"id":8164,"name":8165,"modelId":8149,"published":13,"meta":8166,"data":8168,"variations":8172,"lastUpdated":8173,"firstPublished":8174,"testRatio":33,"createdBy":8158,"lastUpdatedBy":8158,"rev":8159},[],[],1735910450879,"21b78585c9b24588bd7b9ad0b382cd0d","A new class of phishing: Verification phishing and cross-IdP impersonation",{"breakpoints":8167,"kind":36,"lastPreviewUrl":37},{"small":39,"medium":40},{"type":8169,"title":8165,"link":8170,"description":8171},"Article","https://pushsecurity.com/blog/a-new-class-of-phishing-verification-phishing-and-cross-idp-impersonation/","Learn how attackers can bypass SSO and take over SaaS accounts by registering their own IdP account and phishing the verification code. ",{},1735910604859,1735910604854,{"query":8176,"folders":8177,"createdDate":8178,"id":8179,"name":8180,"modelId":8149,"published":13,"meta":8181,"data":8183,"variations":8186,"lastUpdated":8187,"firstPublished":8188,"testRatio":33,"createdBy":8158,"lastUpdatedBy":34,"rev":8159},[],[],1736428164551,"632c4f3af7be46be839eb19054bd3dbb","Cross-IDP impersonation demo video",{"breakpoints":8182,"kind":36,"lastPreviewUrl":37},{"small":39,"medium":40},{"type":4215,"video":8184,"poster":8185},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F75b748cd2f754ae7ac2be8003701446c%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=75b748cd2f754ae7ac2be8003701446c&alt=media&optimized=true","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F993e0af9bb884683885e7fafbf67a929",{},1738139788518,1736429883964,{"query":8190,"folders":8191,"createdDate":8192,"id":8193,"name":8194,"modelId":8149,"published":13,"meta":8195,"data":8197,"variations":8200,"lastUpdated":8201,"firstPublished":8202,"testRatio":33,"createdBy":8158,"lastUpdatedBy":8158,"rev":8159},[],[],1735909589752,"28d473cd70124205916450b07d97ae2e","How AitM phishing kits evade detection",{"breakpoints":8196,"kind":36,"lastPreviewUrl":37},{"small":39,"medium":40},{"type":8169,"title":8194,"link":8198,"description":8199},"https://pushsecurity.com/blog/how-aitm-phishing-kits-evade-detection-p2/","Find out how attackers are using techniques like Document Object Model (DOM) and visual obfuscation to break phishing detection signatures and bypass MFA. ",{},1735909949331,1735909949314,{"query":8204,"folders":8205,"createdDate":8206,"id":8207,"name":8208,"modelId":8149,"published":13,"meta":8209,"data":8211,"variations":8214,"lastUpdated":8215,"firstPublished":8216,"testRatio":33,"createdBy":8158,"lastUpdatedBy":34,"rev":8159},[],[],1736427677124,"40d8da93b44c4dbea06ed0e38e9ef901","Infostealer demo video",{"lastPreviewUrl":37,"kind":36,"breakpoints":8210},{"small":39,"medium":40},{"video":8212,"type":4215,"poster":8213},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7d97282a4d3b4fe19cc482e952bd78b9%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=7d97282a4d3b4fe19cc482e952bd78b9&alt=media&optimized=true","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0782cb479d1e4679b8c1275f29b2641d",{},1738139833210,1736428143287,{"query":8218,"folders":8219,"createdDate":8220,"id":8221,"name":8222,"modelId":8149,"published":13,"meta":8223,"data":8225,"variations":8228,"lastUpdated":8229,"firstPublished":8230,"testRatio":33,"createdBy":8158,"lastUpdatedBy":8158,"rev":8159},[],[],1735910394312,"90ab75f20af149a6956346505428c08b","What we can learn from the recent ServiceNow/Microsoft disclosure",{"breakpoints":8224,"kind":36,"lastPreviewUrl":37},{"small":39,"medium":40},{"type":8169,"description":8226,"title":8222,"link":8227},"Infostealers, stolen credentials, ghost logins, account takeover and the abuse of legitimate app functionality. There’s a lot for us to unpick and learn from.","https://pushsecurity.com/blog/learning-from-the-servicenow-disclosure/",{},1735910423236,1735910423228,1776343288030]