{"id":207564,"date":"2025-04-09T04:01:00","date_gmt":"2025-04-09T04:08:10","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/"},"modified":"2026-04-13T07:46:37","modified_gmt":"2026-04-13T11:46:37","slug":"ep-5-identity-debt-the-hidden-risk-in-saas-applications","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/","title":{"rendered":"EP 5 &#8211; Identity Debt: The Hidden Risk in SaaS Applications"},"content":{"rendered":"<p>In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel&#8217;s elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance. Tune in for tips on how to protect your organization from within and stay ahead of evolving threats.<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">David Puner:<br \/>\nYou are listening to the Security Matters podcast. I\u2019m David Puner, a senior editorial manager at CyberArk, the global leader in identity security.<\/p>\n<p>Imagine this: It started with a single signup form. A product marketing manager was working late, prepping for a board presentation. She needed sharper visuals fast, so she found an AI-powered slide tool online and quickly logged in with her corporate email. No approvals. No red tape. She uploaded sensitive financial data and hit generate.<\/p>\n<p>By morning, security was in crisis mode. That AI tool? Built by a 15-person startup\u2014no security team, no SSO, no offboarding protocols. And no idea it was now holding confidential files from a Fortune 500 company. This wasn\u2019t just a one-off\u2014it was one of many apps quietly adopted across the company. Every click created yet another unmanaged identity\u2014something today\u2019s guest, Lior Yaari, calls identity debt.<\/p>\n<p>Lior Yaari is the CEO and co-founder of Grip Security, a SaaS identity risk management platform that helps companies regain control of sprawling SaaS environments. He\u2019s also a former officer in Israel\u2019s elite Unit 8200, where he cut his teeth in cybersecurity.<\/p>\n<p>In our conversation, he affirms why identity is the new security perimeter\u2014and what organizations can do to protect themselves from within.<\/p>\n<p>Let\u2019s get into it.<\/p>\n<p>David Puner:<br \/>\nCEO and co-founder of Grip Security\u2014welcome to Security Matters. Thanks for coming down to the podcast.<\/p>\n<p>Lior Yaari:<br \/>\nWell, thank you for having me. I&#8217;m really happy to be here.<\/p>\n<p>David Puner:<br \/>\nYeah, absolutely. It&#8217;s a Friday afternoon in March. It feels a little springlike here in the Boston area. We&#8217;re doing deals in real time. Really excited that you\u2019re taking the time to speak with us in the midst of all the excitement.<\/p>\n<p>Lior Yaari:<br \/>\nAlways happy to finish the week and finish it with a good podcast. So I\u2019m really excited for today.<\/p>\n<p>David Puner:<br \/>\nExcellent. So why don\u2019t we get right into things so we can get to the weekend. Grip Security is a SaaS identity risk management platform. To start things off, what does that mean? And how has the market for SaaS identity risk management and SaaS security posture management evolved since you started the company back in January 2021?<\/p>\n<p>Lior Yaari:<br \/>\nSaaS identity risk management\u2014and the SaaS security space in general\u2014is growing. It&#8217;s growing because we live in a world now where the barrier to adopting a new app is just a signup form. Every user, every business unit, can go ahead and sign up for any application they want.<\/p>\n<p>We used to view this as a supply chain problem. All of these apps contain data that belongs to the company. But it\u2019s also an identity problem. When people sign up, they create identities in applications. They create identity debt for the organization. And those identities need to be governed and managed by all our identity tools.<\/p>\n<p>We founded the company when we saw the entire technology innovation shift to SaaS. If you want to buy new technologies for the business, there\u2019s no real alternative anymore. All of these AI tools are just SaaS apps with AI under the hood. There\u2019s a signup form, there\u2019s an admin panel, and they process sensitive business data.<\/p>\n<p>Lior Yaari:<br \/>\nThe data we\u2019ve seen over the last four years\u2014even before the market caught up\u2014is that every company increased the number of vendors they use by about 30% year over year. Four years at that pace? The problem more than doubles in size.<\/p>\n<p>And now the market is responding. Whether it\u2019s Gartner reports calling out the issue, major acquisitions by companies like CrowdStrike, or significant investments in the space\u2014including in Grip\u2014there\u2019s growing awareness. Customers are prioritizing SaaS security as a core project for the year ahead. It\u2019s a great time to be working in this space.<\/p>\n<p>David Puner:<br \/>\nThese days, you&#8217;re based in Boston. From your accent, I\u2019m guessing you were born in Israel?<\/p>\n<p>Lior Yaari:<br \/>\nYes\u2014if anyone hasn\u2019t picked up on it yet. I was born in Israel and moved to Boston about two years ago. I made the move when the company was scaling. Our engineering team is still based in Tel Aviv, but now half of our company is in the U.S.<\/p>\n<p>I relocated right before our Series B round to help establish and grow our U.S. headquarters. Most of our partners and customers are here in the States, and as CEO, I wanted to be close to the team and lead the go-to-market side of the business with boots on the ground.<\/p>\n<p>David Puner:<br \/>\nYou began your career as an officer in Israel\u2019s Unit 8200\u2014which is kind of like the NSA in the U.S. or the U.K.\u2019s GCHQ, right?<\/p>\n<p>Lior Yaari:<br \/>\nThat\u2019s what Wikipedia would say, yes.<\/p>\n<p>David Puner:<br \/>\nAnd what would you say?<\/p>\n<p>Lior Yaari:<br \/>\nGo with what Wikipedia says.<\/p>\n<p>David Puner:<br \/>\nAlright. So you started there\u2014how did that experience shape your career path and eventually lead to founding a SaaS identity risk management company?<\/p>\n<p>Lior Yaari:<br \/>\nBefore anything, I was surrounded by incredible people. I spent seven years in the military learning a lot about technology, but what had the biggest impact on me was seeing how many of the people I served with went on to become founders and leaders in cybersecurity.<\/p>\n<p>After I left the army, I worked at a startup, then became CTO at a major cybersecurity investment firm. That was a turning point. I got really interested in SaaS security from an investor&#8217;s perspective. It was clear\u2014even in 2020 during COVID\u2014that SaaS wasn\u2019t going anywhere.<\/p>\n<p>The traditional security solutions couldn\u2019t scale to meet the growing risks. Customers weren\u2019t satisfied with what was on the market\u2014whether it was legacy CASBs or the first generation of SaaS security tools focused solely on misconfigurations or single platforms like Salesforce and Microsoft 365.<\/p>\n<p>Lior Yaari:<br \/>\nSalesforce and Microsoft 365 are probably the two most important SaaS apps a company uses\u2014but they\u2019re just two out of potentially thousands in an enterprise environment. With SaaS adoption growing 30% year over year, that number quickly multiplies. You simply can\u2019t secure these applications one by one.<\/p>\n<p>That\u2019s where identity comes in. Identity becomes the scalable gateway to securing applications. Our goal with Grip was to bring an identity-first approach to SaaS security.<\/p>\n<p>David Puner:<br \/>\nLet\u2019s talk more about organizations. What are some of the common challenges they face when trying to map, govern, and manage SaaS applications to reduce risk?<\/p>\n<p>Lior Yaari:<br \/>\nGreat question. Let me give you a real-world example. Disney made headlines recently for being breached\u2014twice. In both cases, an ex-employee logged back into an application they previously had access to. They didn\u2019t hack anything. They used the same login, the same credentials, and downloaded the same data\u2014just to a private laptop instead of a corporate one.<\/p>\n<p>It\u2019s an identity challenge: no offboarding, weak password reliance, no SSO. It\u2019s also a data breach, because that data left the organization\u2019s perimeter. But it\u2019s not some sophisticated attack\u2014it\u2019s something that happens every day across companies. The core challenge is that SaaS moves faster than security does.<\/p>\n<p>The business units are the ones choosing and adopting these apps. They&#8217;re creating new identities, managing configurations, and in doing so, they\u2019re creating identity and security debt. Security teams are left holding the bag\u2014responsible for cleaning up and securing everything after the fact.<\/p>\n<p>Lior Yaari:<br \/>\nAnd that mismatch\u2014between the teams creating the debt and the teams paying for it\u2014is a big part of the problem. Business leaders are under pressure to innovate quickly. You\u2019ve probably heard the quote: \u201cCompanies that don\u2019t use AI are going to die.\u201d So now the CEO, the board, the COO\u2014they\u2019re all pushing to adopt tools fast, and they don\u2019t need IT\u2019s help to do it.<\/p>\n<p>That leaves security teams scrambling to secure what\u2019s already been adopted. The risks range from supply chain and compliance issues\u2014like understanding what vendors you&#8217;re actually using\u2014to identity lifecycle challenges, like offboarding users at the right time and enforcing safe credential use. There\u2019s also the risk of misconfigurations or lack of SSO across critical apps.<\/p>\n<p>And the reality is that managing all of this manually just doesn\u2019t scale. The volume is too high, the pace too fast. That\u2019s why we built Grip\u2014to automate SaaS governance and security at scale.<\/p>\n<p>David Puner:<br \/>\nYou mentioned AI. How do you see generative AI impacting cybersecurity, and what measures can be taken to manage those risks?<\/p>\n<p>Lior Yaari:<br \/>\nAI isn\u2019t fundamentally different from any other SaaS app\u2014it\u2019s just moving faster and is often even more user-driven. These tools market directly to employees. They\u2019re encouraged to sign up, start collaborating, and input data. But there are two key challenges.<\/p>\n<p>First, the pace of innovation is unprecedented. AI tools are building more AI tools, and they\u2019re coming from tiny startups with no security team, no compliance oversight, and very little time spent hardening their systems.<\/p>\n<p>Second, the tools are being adopted by the business before security even knows they exist. I was just having breakfast with a friend\u2014a security director at a large company\u2014and she showed me the AI tool she\u2019s using to auto-generate PowerPoint decks. Those decks contain corporate data. She\u2019ll present them to the board. That\u2019s sensitive content being processed by a tool no one vetted.<\/p>\n<p>Security teams can\u2019t just hope for these tools to get better over time. They need visibility. They need identity governance. And they need to extend their control to these apps\u2014even if the apps themselves don\u2019t support basic security features like SSO.<\/p>\n<p>Lior Yaari:<br \/>\nTake OpenAI, for example\u2014it took them two years to add SSO. And they\u2019re one of the biggest players in the space. Most of the AI startups popping up right now have a fraction of that budget and experience. They definitely don\u2019t support enterprise-level identity controls out of the box.<\/p>\n<p>So you need a virtual layer\u2014a security layer on top\u2014that helps you implement offboarding, enforce password hygiene, monitor accounts, and extend IGA policies into those tools. That\u2019s where the real risk mitigation happens.<\/p>\n<p>David Puner:<br \/>\nWhat is shadow AI, and how does it tie into the challenges you&#8217;re trying to solve?<\/p>\n<p>Lior Yaari:<br \/>\nShadow AI is basically AI tools adopted by the business that are unknown to security. The people who own the risk\u2014security and IT\u2014don\u2019t even know these apps are being used. But of course, the users do\u2014they\u2019re using them daily.<\/p>\n<p>It\u2019s part of a broader trend. We\u2019ve already been talking about \u201cshadow IT\u201d and \u201cshadow SaaS\u201d\u2014apps adopted outside of IT\u2019s control. Gartner has even renamed these terms. They now refer to \u201cshadow IT\u201d as business-led IT, and \u201cshadow identities\u201d as distributed identities. That\u2019s a shift in thinking. It\u2019s a recognition that the business isn\u2019t trying to be risky or secretive. They\u2019re just trying to get work done.<\/p>\n<p>So shadow AI? It\u2019s really business-led AI. It\u2019s not something we eliminate\u2014it\u2019s something we have to support safely. These tools are useful. But security has to step in and provide the right visibility, governance, and controls\u2014without blocking productivity.<\/p>\n<p>David Puner:<br \/>\nSpeaking of identities, how are you approaching the increasing complexity of identity management\u2014especially with the rise of machine identities? How do those introduce new layers of risk?<\/p>\n<p>Lior Yaari:<br \/>\nIt\u2019s a huge challenge. We often focus on how users interact with third-party apps, but many of those apps have their own marketplaces now\u2014Salesforce, Slack, Notion, Monday, Zoom, and so on. These marketplaces let you enhance functionality by connecting third-party apps. But behind those integrations are machine identities\u2014apps talking to other apps in the background.<\/p>\n<p>Once those connections are made, they often operate independently of users. They&#8217;re persistent and can be hard to track. That\u2019s where risk comes in.<\/p>\n<p>A great example is the CircleCI breach from a few years ago. CircleCI is deeply integrated into many organizations\u2019 CI\/CD pipelines and cloud environments. When attackers compromised CircleCI, they gained programmatic access to tools like GitHub, AWS, and others. Suddenly, one app becomes the gateway to many more. That\u2019s what we call application hopping\u2014jumping between apps through machine-to-machine tokens.<\/p>\n<p>And here\u2019s the kicker: even if you secure user access to Salesforce with least privilege and identity controls, a single third-party integration\u2014like a BI tool connected to Salesforce\u2014can expose all of that data. That one small app can bypass all your hard work.<\/p>\n<p>So machine identities need to be monitored, secured, and governed just like human ones. Otherwise, you\u2019ve got serious gaps in your perimeter.<\/p>\n<p>David Puner:<br \/>\nYou make it sound so easy.<\/p>\n<p>Lior Yaari:<br \/>\nI wish it were easy. But then again, if it were, we probably wouldn\u2019t have a business.<\/p>\n<p>David Puner:<br \/>\nZooming out a bit\u2014what do you see as the most significant cyberthreats today? And how do you think that may shift in the near future?<\/p>\n<p>Lior Yaari:<br \/>\nRight now, there are a lot of great opportunities\u2014for both attackers and defenders. That\u2019s what makes cybersecurity so dynamic. But attackers are often the first to adopt new technologies. Not necessarily faster than startups, but definitely faster than enterprises trying to integrate those technologies into their existing security stacks.<\/p>\n<p>With AI, for example, attackers are already finding ways to exploit it. Traditional phishing detection relies on things like spotting spelling errors. That doesn\u2019t work anymore. Attackers can use AI to generate thousands of well-written phishing emails at once. They can run massive campaigns with just a script and an LLM.<\/p>\n<p>The second big concern for me is trust\u2014trust in voice, video, and even identity itself. With a few minutes of audio from this podcast, someone could generate a fake call that sounds just like me. Sure, maybe my accent might throw them off a little, but it\u2019s possible. You could fake a conversation, make it sound legit. That\u2019s going to require a whole new layer of verification and awareness inside companies.<\/p>\n<p>Lior Yaari:<br \/>\nIf phishing messages can trick people through text, imagine how effective they\u2019ll be when delivered through a convincing voice or video. Most people aren\u2019t trained to question what sounds real. That\u2019s going to make social engineering even more dangerous.<\/p>\n<p>Then there\u2019s the broader shift: we\u2019ve moved infrastructure from on-prem to the cloud. We\u2019ve moved identity from being something contained within a local network to something that lives across the internet. That fundamentally changes the nature of the security perimeter.<\/p>\n<p>David Puner:<br \/>\nIs there really even such a thing as a perimeter anymore? How do you define it now?<\/p>\n<p>Lior Yaari:<br \/>\nIt\u2019s all about identity. Gartner calls it the cybersecurity mesh architecture. In a world where access can come from anywhere and data is everywhere, identity and context become your ultimate control points. So yes, there is a perimeter\u2014but it\u2019s identity-centric. And everything needs to move in that direction.<\/p>\n<p>David Puner:<br \/>\nHow can organizations stay ahead of evolving threats like ransomware, zero-day attacks, and supply chain vulnerabilities?<\/p>\n<p>Lior Yaari:<br \/>\nThere\u2019s no one-size-fits-all solution. But the first step is knowing what the problems are. I feel for CISOs. Their threat list is long\u2014and it keeps growing. It\u2019s tough for smaller organizations with lean teams. And even for large organizations, the variety of threats they face is overwhelming.<\/p>\n<p>Cybersecurity is one of the few spaces where there\u2019s an active adversary. If we slow down, they\u2019ll get ahead. So we need to keep evolving\u2014how we think, how we plan, and how we prioritize.<\/p>\n<p>Lior Yaari:<br \/>\nWe sometimes assume cybersecurity used to be easier, but that\u2019s just because we didn\u2019t have the tools or understanding we do now. Attackers have become more sophisticated. So we need to stay informed about new problems, but also be open to new solutions.<\/p>\n<p>Yes, it can be tiring. There are a lot of new companies out there solving specific problems, and it\u2019s hard to evaluate them all. But the only way to address complex and evolving threats is to partner with people who are dedicating their entire day to solving that one thing you haven\u2019t had time to fully explore yet.<\/p>\n<p>David Puner:<br \/>\nIn such a rapidly changing landscape, how do you personally stay on top of it all?<\/p>\n<p>Lior Yaari:<br \/>\nI\u2019m lucky that I get to focus deeply on a problem I care about. I go to a lot of conferences. I talk to a lot of people. And I spend time with early-stage founders. They\u2019re on the ground, building the next wave of cybersecurity tools. They have insights into problems that aren\u2019t even mainstream yet. Talking with them\u2014and VCs, and staying active on platforms like LinkedIn\u2014is how I stay current.<\/p>\n<p>David Puner:<br \/>\nI\u2019d read somewhere that you had a focus on automotive at one point. What about that industry stood out to you as relevant to the broader cybersecurity landscape?<\/p>\n<p>Lior Yaari:<br \/>\nYeah, back in the day, one of my parents\u2019 old friends asked what I did for a living, and I told him I was breaking into cars. He looked pretty disappointed\u2014thought I\u2019d end up doing something more respectable. But it was all virtual. I was working in automotive security, helping major car manufacturers secure their vehicles.<\/p>\n<p>Cars today are essentially rolling networks of IoT devices. There\u2019s a great quote I love: \u201cThe \u2018S\u2019 in IoT stands for security.\u201d Of course, there\u2019s no \u201cS\u201d in IoT\u2014because security is often missing.<\/p>\n<p>That work taught me a lot. Cars are incredibly complex systems. And when you\u2019re building something that intricate, security often takes a backseat. It\u2019s the same with corporate networks. Even in something like a marketing org, the systems are layered and sophisticated. People don\u2019t think someone will exploit what they\u2019re building. They\u2019re just trying to do their jobs.<\/p>\n<p>Professionals\u2014from engineers to CFOs\u2014don\u2019t ignore security because they\u2019re malicious. They ignore it because they don\u2019t think about the bad things that can happen. That means it\u2019s on us, the security professionals, to be proactive\u2014not just in stopping breaches, but in helping people understand risk before they make decisions.<\/p>\n<p>David Puner:<br \/>\nThat ties into what you\u2019re doing now\u2014supporting safer SaaS adoption.<\/p>\n<p>Lior Yaari:<br \/>\nExactly. Whether it\u2019s phishing education or identity governance, the goal is the same: support people before mistakes happen\u2014not after.<\/p>\n<p>David Puner:<br \/>\nOne last thing\u2014our research team came across a story about you doing NYU students\u2019 homework when you were 16. True?<\/p>\n<p>Lior Yaari:<br \/>\nCan\u2019t believe that made it into the notes! Yeah, when I was in high school, I got connected with a NYU student who didn\u2019t want to do his intro to computer science homework. He\u2019d message me a couple days before a deadline and offer $70 an hour to finish it. For a 16-year-old, that was incredible money.<\/p>\n<p>I started doing Java assignments, then got into security coursework. I was learning Linux and writing reports on securing operating systems before I even really knew what cybersecurity was. It wasn\u2019t what launched my career, but it was definitely the first step in that direction.<\/p>\n<p>David Puner:<br \/>\nAnd how did he do on those assignments?<\/p>\n<p>Lior Yaari:<br \/>\nHe did very well. We haven\u2019t stayed in touch, and I don\u2019t think he\u2019d pass the Grip interview process today.<\/p>\n<p>David Puner:<br \/>\nLior Yaari, thank you so much for joining us on Security Matters. This was fantastic.<\/p>\n<p>Lior Yaari:<br \/>\nThank you, David. I had a lot of fun.<\/p>\n<p>David Puner:<br \/>\nThere you have it. Thanks for listening to Security Matters. If you liked this episode, please follow us wherever you get your podcasts so you don\u2019t miss future episodes. And if you\u2019re feeling generous, leave us a review\u2014it helps more than you\u2019d think.<\/p>\n<p>Have a question, a comment, or an idea for an episode? Reach out to us at securitymatterspodcast@cyberark.com.<\/p>\n<p>We\u2019ll see you next time.<\/p><\/div>\n","protected":false},"featured_media":213801,"template":"","class_list":["post-207564","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 5 - Identity Debt: The Hidden Risk in SaaS Applications | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 5 - Identity Debt: The Hidden Risk in SaaS Applications\" \/>\n<meta property=\"og:description\" content=\"In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T11:46:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"18 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/\",\"name\":\"EP 5 - Identity Debt: The Hidden Risk in SaaS Applications | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg\",\"datePublished\":\"2025-04-09T04:08:10+00:00\",\"dateModified\":\"2026-04-13T11:46:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 5 &#8211; Identity Debt: The Hidden Risk in SaaS Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 5 - Identity Debt: The Hidden Risk in SaaS Applications | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/","og_locale":"zh_TW","og_type":"article","og_title":"EP 5 - Identity Debt: The Hidden Risk in SaaS Applications","og_description":"In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-13T11:46:37+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"18 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/","name":"EP 5 - Identity Debt: The Hidden Risk in SaaS Applications | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg","datePublished":"2025-04-09T04:08:10+00:00","dateModified":"2026-04-13T11:46:37+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/YzI2OS5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-5-identity-debt-the-hidden-risk-in-saas-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 5 &#8211; Identity Debt: The Hidden Risk in SaaS Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/podcast\/207564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media\/213801"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=207564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}