{"id":55510,"date":"2024-03-05T17:00:00","date_gmt":"2024-03-05T17:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/"},"modified":"2024-03-05T17:00:00","modified_gmt":"2024-03-05T17:00:00","slug":"secure-saas-applications-with-valence-security-and-microsoft-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/","title":{"rendered":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b"},"content":{"rendered":"<p><em>This blog post is part of the Microsoft Intelligent Security Association <\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\" target=\"_blank\" rel=\"noreferrer noopener\"><em>guest blog series<\/em><\/a><em>. <\/em><a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>\u202f&nbsp;<\/p>\n<p>Software as a service (SaaS) adoption has accelerated at a lightning speed, enabling collaboration, automation, and innovation for businesses large and small across every industry vertical\u2014from government, education, financial service to tech companies. Every SaaS application is now expanding its offering to allow better integration with the enterprise ecosystem and advanced collaboration features, becoming more of a \u201cplatform\u201d than an \u201capplication.\u201d To further complicate the security landscape, business users are managing these SaaS applications with little to no security oversight, creating a decentralized administration model. All this is leading to a growing risk surface with complex misconfigurations that can expose organization\u2019s identities, sensitive data, and business processes to malicious actors.&nbsp;<\/p>\n<p>To combat this challenge, Valence and <a href=\"https:\/\/www.microsoft.com\/security\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a> work together to ensure that SaaS applications are configured according to the best security practices and improve the security posture of identities configured in each individual SaaS application. Together, Valence and Microsoft:&nbsp;&nbsp;<\/p>\n<ul>\n<li>Centrally manage SaaS identities permissions and access.<\/li>\n<li>Enforce strong authentication by ensuring proper MFA (multi-factor authentication) and SSO (single sign-on) enrollment and managing local SaaS users.<\/li>\n<li>Detect and revoke unauthorized non-human SaaS identities such as APIs, service accounts, and tokens.<\/li>\n<li>Incorporate SaaS threat detection capabilities to improve SaaS incident response.<\/li>\n<\/ul>\n<p>As most of the sensitive corporate data shifted from on-prem devices to the cloud, security teams need to ensure they manage the risks of how this data is being accessed and managed. Integrating Valence\u2019s SaaS Security with the Microsoft Security ecosystem now provides a winning solution.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"saas-applications-are-prime-targets\">SaaS applications are prime targets&nbsp;&nbsp;<\/h2>\n<p><a href=\"https:\/\/www.valencesecurity.com\/threat-labs\/saas-breach-guide\" target=\"_blank\" rel=\"noreferrer noopener\">Recent high profile breaches<\/a> have shown that attackers are targeting SaaS applications and are leveraging misconfigurations and human errors to gain high privilege access to sensitive applications and data. While many organizations have implemented SSO and MFA as their main line of defense when it comes to SaaS, recent <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/five-lessons-learned-from-oktas-support-site-breach\" target=\"_blank\" rel=\"noreferrer noopener\">major breaches have proven otherwise<\/a>. Attackers have identified that MFA fatigue, social engineering and targeting the SaaS providers themselves can bypass many of the existing mechanisms that security teams have put in place. These add to high-profile breaches where attackers leveraged legitimate third-party open authorization (<a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/five-lessons-learned-from-oktas-support-site-breach\" target=\"_blank\" rel=\"noreferrer noopener\">OAuth<\/a>) tokens to gain unauthorized access to SaaS applications, and many more attack examples.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"state-of-saas-security-risks\">State of SaaS security risks&nbsp;<\/h2>\n<p>According to our <a href=\"https:\/\/www.valencesecurity.com\/lp\/2023-state-of-saas-security\" target=\"_blank\" rel=\"noreferrer noopener\">2023 SaaS Security Report<\/a> which analyzed real SaaS environments to measure their security posture before they implemented an effective SaaS security program. The results showed that every organization didn\u2019t enforce MFA on 100% of their identities\u2014there are some exceptions, such as service accounts, contractors, and shared accounts, or simply lack of effective monitoring of drift. In addition, one out of eight SaaS accounts are dormant and not actively used. Offboarding users is not only important to save costs, but attackers also like to target these accounts for account takeover attacks since they are typically less monitored. Other key stats were that 90% of externally shared files haven\u2019t been used by external collaborators for at least 90 days and that every organization has granted multiple third-party vendors organization-wide access to their emails, files, and calendars.&nbsp;<\/p>\n<figure data-wp-context=\"{ &quot;core&quot;: { &quot;image&quot;: { &quot;imageLoaded&quot;: false, &quot;initialized&quot;: false, &quot;lightboxEnabled&quot;: false, &quot;hideAnimationEnabled&quot;: false, &quot;preloadInitialized&quot;: false, &quot;lightboxAnimation&quot;: &quot;zoom&quot;, &quot;imageUploadedSrc&quot;: &quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.png&quot;, &quot;imageCurrentSrc&quot;: &quot;&quot;, &quot;targetWidth&quot;: &quot;624&quot;, &quot;targetHeight&quot;: &quot;448&quot;, &quot;scaleAttr&quot;: &quot;&quot;, &quot;dialogLabel&quot;: &quot;Enlarged image&quot; } } }\" data-wp-interactive class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-effect--setstylesonresize=\"effects.core.image.setStylesOnResize\" data-wp-effect=\"effects.core.image.setButtonStyles\" data-wp-init=\"effects.core.image.initOriginImage\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-on--load=\"actions.core.image.handleLoad\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><button class=\"lightbox-trigger\" type=\"button\" aria-haspopup=\"dialog\" aria-label=\"Enlarge image: Valence Security 2023 SaaS Security Report Top Gaps\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-style--right=\"context.core.image.imageButtonRight\" data-wp-style--top=\"context.core.image.imageButtonTop\"> <svg width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> <path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> <\/svg> <\/button> <\/p>\n<div data-wp-body class=\"wp-lightbox-overlay zoom\" data-wp-bind--role=\"selectors.core.image.roleAttribute\" data-wp-bind--aria-label=\"selectors.core.image.dialogLabel\" data-wp-class--initialized=\"context.core.image.initialized\" data-wp-class--active=\"context.core.image.lightboxEnabled\" data-wp-class--hideanimationenabled=\"context.core.image.hideAnimationEnabled\" data-wp-bind--aria-modal=\"selectors.core.image.ariaModal\" data-wp-effect=\"effects.core.image.initLightbox\" data-wp-on--keydown=\"actions.core.image.handleKeydown\" data-wp-on--touchstart=\"actions.core.image.handleTouchStart\" data-wp-on--touchmove=\"actions.core.image.handleTouchMove\" data-wp-on--touchend=\"actions.core.image.handleTouchEnd\" data-wp-on--click=\"actions.core.image.hideLightbox\" tabindex=\"-1\"> <button type=\"button\" aria-label=\"Close\" class=\"close-button\" data-wp-on--click=\"actions.core.image.hideLightbox\"> <svg viewBox=\"0 0 24 24\" width=\"20\" height=\"20\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\" \/><\/svg> <\/button> <\/p>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full responsive-image\"><img decoding=\"async\" data-wp-bind--src=\"context.core.image.imageCurrentSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><\/figure>\n<\/div>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full enlarged-image\"><img decoding=\"async\" data-wp-bind--src=\"selectors.core.image.enlargedImgSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><\/figure>\n<\/div><\/div>\n<\/figure>\n<p><em>Figure 1. Top SaaS Security gaps identified in the 2023 State of SaaS Security Report<\/em>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"holistic-saas-security-strategy\">Holistic SaaS security strategy&nbsp;<\/h2>\n<p>Establishing a holistic SaaS security strategy requires to bring together many elements\u2014from shadow SaaS discovery, through strong authentication, <a href=\"https:\/\/www.valencesecurity.com\/use-cases\/saas-identity-security\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a> of both humans and non-humans, managing and remediating SaaS misconfigurations, enforcing data leakage prevention policies, and finally, establishing scalable incident response. Valence and Microsoft take security teams one step further toward a more holistic approach.&nbsp;<\/p>\n<p>Valence joined the Microsoft Intelligence Security Association (MISA) and integrated with Microsoft security products\u2014<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\">Microsoft Entr<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\">a ID<\/a> and \u200b\u200b\u200b\u200b<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>\u2014to enhance&nbsp;customers\u2019 capabilities to <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/valence-integrates-with-azure-ad\" target=\"_blank\" rel=\"noreferrer noopener\">manage their SaaS risks<\/a>, effectively remediate them, and respond to SaaS breaches. The Valence SaaS Security Platform provides insight and context on SaaS risks such as misconfigurations, identities, data shares, and <a href=\"https:\/\/www.valencesecurity.com\/use-cases\/saas-integration-governance\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS-to-SaaS integrations<\/a>. Extending existing controls with SaaS Security Posture Management (SSPM) capabilities and SaaS <a href=\"https:\/\/www.valencesecurity.com\/platform\/automated-remediation\" target=\"_blank\" rel=\"noreferrer noopener\">risk remediation<\/a> capabilities.&nbsp;Valence is also a proud participant of the Partner Private Preview of <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\">Microsoft Copilot for Security<\/a>. This involves working with Microsoft product teams to help shape Copilot for Security product development in several ways, including validation and refinement of new and upcoming scenarios, providing feedback on product development and operations to be incorporated into future product releases, and validation and feedback of APIs to assist with Copilot for Security\u2019s extensibility.&nbsp;<\/p>\n<figure data-wp-context=\"{ &quot;core&quot;: { &quot;image&quot;: { &quot;imageLoaded&quot;: false, &quot;initialized&quot;: false, &quot;lightboxEnabled&quot;: false, &quot;hideAnimationEnabled&quot;: false, &quot;preloadInitialized&quot;: false, &quot;lightboxAnimation&quot;: &quot;zoom&quot;, &quot;imageUploadedSrc&quot;: &quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.png&quot;, &quot;imageCurrentSrc&quot;: &quot;&quot;, &quot;targetWidth&quot;: &quot;6720&quot;, &quot;targetHeight&quot;: &quot;3756&quot;, &quot;scaleAttr&quot;: &quot;&quot;, &quot;dialogLabel&quot;: &quot;Enlarged image&quot; } } }\" data-wp-interactive class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-effect--setstylesonresize=\"effects.core.image.setStylesOnResize\" data-wp-effect=\"effects.core.image.setButtonStyles\" data-wp-init=\"effects.core.image.initOriginImage\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-on--load=\"actions.core.image.handleLoad\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><button class=\"lightbox-trigger\" type=\"button\" aria-haspopup=\"dialog\" aria-label=\"Enlarge image: Valence SaaS Security Platform\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-style--right=\"context.core.image.imageButtonRight\" data-wp-style--top=\"context.core.image.imageButtonTop\"> <svg width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> <path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> <\/svg> <\/button> <\/p>\n<div data-wp-body class=\"wp-lightbox-overlay zoom\" data-wp-bind--role=\"selectors.core.image.roleAttribute\" data-wp-bind--aria-label=\"selectors.core.image.dialogLabel\" data-wp-class--initialized=\"context.core.image.initialized\" data-wp-class--active=\"context.core.image.lightboxEnabled\" data-wp-class--hideanimationenabled=\"context.core.image.hideAnimationEnabled\" data-wp-bind--aria-modal=\"selectors.core.image.ariaModal\" data-wp-effect=\"effects.core.image.initLightbox\" data-wp-on--keydown=\"actions.core.image.handleKeydown\" data-wp-on--touchstart=\"actions.core.image.handleTouchStart\" data-wp-on--touchmove=\"actions.core.image.handleTouchMove\" data-wp-on--touchend=\"actions.core.image.handleTouchEnd\" data-wp-on--click=\"actions.core.image.hideLightbox\" tabindex=\"-1\"> <button type=\"button\" aria-label=\"Close\" class=\"close-button\" data-wp-on--click=\"actions.core.image.hideLightbox\"> <svg viewBox=\"0 0 24 24\" width=\"20\" height=\"20\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\" \/><\/svg> <\/button> <\/p>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full responsive-image\"><img decoding=\"async\" data-wp-bind--src=\"context.core.image.imageCurrentSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><\/figure>\n<\/div>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full enlarged-image\"><img decoding=\"async\" data-wp-bind--src=\"selectors.core.image.enlargedImgSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><\/figure>\n<\/div><\/div>\n<\/figure>\n<p><em>Figure 2. Illustrative data: The Valence Platform provides a single pane of glass to find and fix SaaS risk across four core use cases: data protection, SaaS to SaaS governance, identity security, and configuration management.<\/em>&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"secure-saas-human-and-non-human-identities\">Secure SaaS human and non-human identities<\/h2>\n<p>In the modern identity-first environment, most attackers focus on targeting high privilege users, dormant accounts, and other risks. Enforcing zero trust access has become a core strategy for many security teams. Security teams need to identify all the identities they need to secure.&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-single-sign-on\">Microsoft Entra SSO<\/a> management combined with Valence\u2019s SaaS application monitoring\u2014to detect accounts created\u2014provides a holistic view into human identities and non-human (Enterprise Applications, service accounts, APIs, OAuth and 3rd party apps).&nbsp;&nbsp;<\/p>\n<p>Microsoft Entra ID centrally enforces strong authentication such as MFA and Valence discovers enforcement gaps or users that are not managed by the central SSO. Valence also monitors the SaaS applications themselves to discover the privileges granted to each identity and provides recommendations on how to enforce least privilege with minimal administrative access. To continuously validate verification based on risks, the final piece of zero trust strategy, Valence <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/detecting-risky-behavior-with-microsoft-and-valence\" target=\"_blank\" rel=\"noreferrer noopener\">leverages the risky users and service principals signals<\/a> from Microsoft Entra ID and combines them with signals from other SaaS applications for a holistic view into identity risks.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"protect-saas-applications\">Protect SaaS applications&nbsp;<\/h2>\n<p>Microsoft has a wide SaaS offering that is fueling enterprise innovation. These services are central to core business functions and employee collaboration, cover many use cases, and are spread across multiple business units, but are tied together in many cases such as identity and access management, and therefore their security posture is often related as well. Managing the security posture of SaaS services can be complex because of the multiple configurations and the potential cross service effects that require security teams to build their expertise across a wide range of SaaS.&nbsp;&nbsp;<\/p>\n<p>Many security teams view SaaS apps as part of their more holistic view into SaaS security posture management and would like to create cross-SaaS security policies and enforce them. Valence\u2019s platform integrates with Microsoft Entra ID and other SaaS services using Microsoft via Microsoft Graph to normalize the complex data sets and enable security teams to closely monitor the security posture of their SaaS applications in Microsoft alongside the rest of their SaaS environment.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"enhance-saas-threat-detection-and-incident-response\">Enhance SaaS threat detection and incident response&nbsp;<\/h2>\n<p>Improving SaaS security posture proactively reduces the chances of a breach, but unfortunately SaaS breaches can still occur, and organizations need to prepare their threat detection coverage and incident response plans. The built in human and non-human identity threat detection capabilities of Microsoft Entra ID, <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/empowering-saas-incident-response-with-valence-and-microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">combined with Microsoft Sentinel<\/a> log correlation and security automation, and Microsoft Copilot for Security\u2019s advanced AI capabilities, create a powerful combination to detect and respond to threats. Valence expands existing detections from compromised endpoint and identity with important SaaS context\u2014for example, did the compromise device belong to a SaaS admin user? Did the compromised identity perform suspicious activities in other SaaS applications? The expanded detections provide critical insights to prioritize and assess the blast radius of breaches. Additionally, Valence\u2019s SaaS threat detection can trigger threat detection workflows in Microsoft products based on its unique indicator of compromise monitoring.&nbsp;<\/p>\n<p>Together, Valence and Microsoft combine the best of all worlds when it comes to SaaS security. From SaaS discovery, through SaaS security posture management, remediating risks, and detecting threats\u2014Valence and Microsoft enable secure adoption of SaaS applications. Modern SaaS risks and security challenges require a holistic view into <a href=\"https:\/\/www.valencesecurity.com\/platform\/saas-risk-management\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS risk management<\/a> and remediation. <a href=\"https:\/\/www.valencesecurity.com\/demo\" target=\"_blank\" rel=\"noreferrer noopener\">Get started today<\/a>.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"about-valence-security\">About Valence Security&nbsp;<\/h2>\n<p>Valence is a leading SaaS security company that combines SSPM and advanced remediation with business user collaboration to find and fix SaaS security risks. SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications. With Valence, security teams can empower their business to securely adopt SaaS. Valence is backed by leading cybersecurity investors like Microsoft\u2019s M12 and YL Ventures, and is trusted by leading organizations. Valence is available for purchase through <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/valencesecurityinc1673598943514.valance_security_platform?tab=Overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Marketplace<\/a>. For more information, visit their <a href=\"http:\/\/www.valencesecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;<\/p>\n<p>Be among the first to hear about new products, capabilities, and offerings at Microsoft Secure digital event on March 13, 2024.\u200b\u202fLearn from industry luminaries and influencers. <a href=\"https:\/\/mssecure.eventcore.com\/?ocid=cmmh353yyg6\" target=\"_blank\" rel=\"noreferrer noopener\">Register today<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA), visit\u202four <a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a> where you can learn about the MISA program, product integrations, and find MISA members. Visit the <a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a> to learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f<\/p>\n<p>\u200b\u200bTo learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a> Bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u200bThe rapid adoption of Software as a Service (SaaS) has revolutionized collaboration and innovation across industries. SaaS offerings now emphasize integration and advanced collaboration, blurring the line between application and platform. Decentralized administration models and minimal security oversight pose risks, leading to complex misconfigurations. Valence and Microsoft Security address these challenges, ensuring SaaS applications adhere to security best practices and improve the security postures of identities configured in each individual SaaS application. \u200b<br \/>\nThe post \u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55511,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-55510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b\",\"datePublished\":\"2024-03-05T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/\"},\"wordCount\":1592,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/secure-saas-applications-with-valence-security-and-microsoft-security.webp\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/\",\"name\":\"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/secure-saas-applications-with-valence-security-and-microsoft-security.webp\",\"datePublished\":\"2024-03-05T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/secure-saas-applications-with-valence-security-and-microsoft-security.webp\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/secure-saas-applications-with-valence-security-and-microsoft-security.webp\",\"width\":624,\"height\":448},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/secure-saas-applications-with-valence-security-and-microsoft-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/","og_locale":"en_US","og_type":"article","og_title":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-05T17:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b","datePublished":"2024-03-05T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/"},"wordCount":1592,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/secure-saas-applications-with-valence-security-and-microsoft-security.webp","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/","url":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/","name":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/secure-saas-applications-with-valence-security-and-microsoft-security.webp","datePublished":"2024-03-05T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/secure-saas-applications-with-valence-security-and-microsoft-security.webp","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/secure-saas-applications-with-valence-security-and-microsoft-security.webp","width":624,"height":448},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/secure-saas-applications-with-valence-security-and-microsoft-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55510"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55511"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}