SaaS Security

Expert Insights columns, shadow AI research, and SaaS posture management

We write Expert Insights columns for The Hacker News and produce blog content for Reco covering shadow AI adoption, non-human identities, SaaS attack surface expansion, and browser-based AI exploits. This ongoing engagement has established Reco as a consistent voice in SaaS security across one of the industry’s most-read publications.

Published Work (13)
Reco Sponsored PostSponsored campaign introducing Reco's SaaS security platform to the cybersecurity communitySponsoredReco When Your Browser Becomes the Attacker: AI Browser ExploitsHow AI-powered browser extensions and agents create new SaaS attack vectorsContentThe Hacker NewsReco What GTG-1002 and Claude-Style Attacks Mean for SaaS VerificationWhy AI model impersonation undermines trust in SaaS identity verificationContentThe Hacker NewsReco The Problem With 'Trust but Verify' Is That We Don't VerifyHow organisations skip the verification step and what it costs themContentThe Hacker NewsReco Who's Really Using Your SaaS? The Rise of Non-Human IdentitiesService accounts, API keys, and bots now outnumber human users in most SaaS environmentsContentThe Hacker NewsReco ShinyHunters Data Breach vs. SaaS: Why Dynamic Security MattersLessons from the ShinyHunters breach for SaaS security posture managementContentThe Hacker NewsReco Why SaaS AI Governance Should Be on Every CISO's AgendaShadow AI adoption is outpacing security teams' ability to monitor itContentThe Hacker NewsReco The SaaS Attack Surface Just Expanded to ClawdBotHow Anthropic's web crawler introduces new risks for SaaS-connected organisationsContentReco Device Inventory: Unified Visibility Security InsightsMapping every device accessing your SaaS environment for complete visibilityContentReco 5 Signs It's Time to Migrate from Your Legacy SSPMWhen your SaaS security posture management tool is holding you backContentReco What the Salesloft, Drift, and ShinyHunters Breaches Reveal About SaaS RiskCommon patterns across three major SaaS-adjacent breachesContentReco Popular Doesn't Mean Secure: The 2025 State of Shadow AI ReportContentReco ShinyHunters Data Breach vs. SaaS: Why Dynamic Security MattersContentReco
Lisa O’Reilly
“Daniel is extremely knowledgeable about the cybersecurity and threat landscape. His research is thorough, and his writing is publishing-ready.”
Lisa O’Reilly, VP of Marketing, SlashNext
250+ Media Mentions