Push icon
  • Product
  • Use cases
    SaaS discovery
    SaaS discovery
    Detect SaaS apps that employees are using in your company.
    Risky third-party integrations
    Risky third-party integrations
    Nudge employees to remove unused third-party integrations.
    Malicious mail rule detection
    Malicious mail rule detection
    A strong indicator of compromise. Detect and respond automatically.
    Automated MFA deployment
    Automated MFA deployment
    Use ChatOps to automatically nudge employees to enroll.
  • Pricing
  • Blog
  • About
12 min read

Rolling-your-own SaaS discovery

We’ve compiled some methods for discovering SaaS. Lets explore each approach and learn new ways to discover unknown SaaS, capture SaaS use, and secure it.

Jacques Louw
Jacques Louw
4 May 2022
  • Asset discovery
All Asset discovery OAuth Case studies Email security Account security Company news
5 min read

Microsoft rolls out Security Defaults for Azure AD to secure access

Microsoft is starting to roll out Security Defaults for Azure AD for those who haven’t turned them on yet. Here’s what you need to know.

Sally Soulliere
Sally Soulliere
15 Jun 2022
  • Account security
7 min read

Investigating user delegated OAuth tokens in Google Workspace - a ride along

Introduction to OAuth tokens in Google Workspace, how they are used, reasons you might want to review them, and a discussion of how you might go about it.

Jacques Louw
Jacques Louw
15 Jul 2021
  • Account security
5 min read

Consent phishing: the emerging phishing technique that can bypass 2FA

Consent phishing is an emerging technique attackers are using to compromise user accounts, even if they have Multi-factor Authentication (MFA or 2FA) enabled.

Alex Triaca
Alex Triaca
6 Jul 2021
  • Account security
  • OAuth
4 min read

How to set up Multi-Factor Authentication for Microsoft 365

Conditional Access, Security Defaults, or Legacy? Figuring out how to deploy MFA in Microsoft 365 can be complex. This post summarises your options.

Andy Waugh
Andy Waugh
15 Mar 2021
  • Account security
6 min read

Which MFA methods should you use?

SMS, Authenticator apps, Security Keys, and more! We compare them from a user experience, security, cost, and security aspect.

Andy Waugh
Andy Waugh
15 Mar 2021
  • Account security
6 min read

Multi-Factor Authentication is the top security control for most small and...

Why Multi-Factor Authentication (MFA aka 2FA) is so useful for small and medium-sized businesses, and how to deploy it successfully.

Jacques Louw
Jacques Louw
15 Mar 2021
  • Account security
push logo
Product
  • Overview
  • Pricing
Use cases
  • SaaS discovery
  • Risky third-party integrations
  • Malicious mail rule detection
  • Automated MFA deployment
Push
  • Team
  • Investors
  • Contact
  • Careers
Assurance
  • Privacy policy
  • Cookie policy
  • Terms
  • Sub-processors
© Push 2022. All rights reserved.
cyber essentials logo
You're offline. Waiting to reconnect.