Insights & Resources

Security clarity starts
with understanding

Thought leadership, product insights, Zero Trust guidance, and practical resources for security leaders and practitioners navigating today's threat landscape.

Latest Articles

Showing all posts
Loom Security
Product & CINQUE

Technology Sprawl and Inefficient Operations

Security teams struggle with fragmented tools and limited visibility, making it difficult to piece together a complete “story” of user activity and leading to inefficient investigations and potential missteps. By shifting to a persona-driven view of the full user journey—from device to data—organizations can gain unified visibility, improve decision-making, and build more resilient, user-centric security programs.

Loom Security
Thought Leadership

From Data Hoarding to Identity Intelligence

The security industry has centralized massive amounts of data into SIEM platforms, but still lacks the ability to turn that data into meaningful insight about user behavior and risk. Loom Innovations addresses this gap by building an identity intelligence engine that correlates activity across identity, device, network, application, and data to create a dynamic, persona-driven view of security aligned to how the business actually operates.

Loom Security
Product & CINQUE

From the Field to the Platform: Building What Security Teams Actually Need

A behind-the-scenes look at Loom Security’s evolution from services-led insights to product innovation, culminating in the launch of Loom Innovations. The post explores how Loom is building a unified security posture management platform that brings visibility, context, and real-world applicability across fragmented security tools.

Loom Security
Thought Leadership

The Silent Persistence Layer: Why OAuth Governance Is Now a Critical Identity Risk

OAuth tokens have become a silent persistence layer in modern identity environments, allowing attackers to maintain access even after passwords are reset and MFA is enforced. This article explores why OAuth governance is now critical to IAM strategy and how organizations can close this growing gap before it’s exploited.

Loom Security
Thought Leadership

How Persona-Based Security is Redefining Defense- and why Unified Security Posture Management is the Future

Persona-based security reframes defense around user behavior and context, replacing fragmented, tool-driven approaches with a unified view of risk that connects identity, device, application, and data signals. Unified Security Posture Management (USPM) enables this shift by eliminating silos, reducing complexity, and turning scattered telemetry into actionable insight, allowing organizations to move from reactive security to proactive, business-aligned risk management.

Webinars & Events & Videos

Learn directly from the Loom Security team

Live sessions, recorded demos, and panel discussions on the future of security posture management and Zero Trust.

On Demand

Loom Lobby Talks E01

Join the Loom leadership team as they share topics for disuccion while on the roasd with customers.

Watch Recording
On Demand

Marketing Mary Parts 2 & 3

This is the continuation of our Marketing Mary series explaining how a user's journey throughout their day intersetcs with many aspects of the organization security posture.

Watch Recording
On Demand

Loom Leadership

Our Founder & CEO Chuck Crawford shares his thoughts around the leadership team he's pulled together at Loom Security.

Watch Recording
On Demand

Why is Loom Different

Our Founder & CEO Chuck Crawford shares his thoughts around why Loom Security is different and why we're here.

Watch Recording
On Demand

Stay Humble

Our Founder & CEO Chuck Crawford shares his thoughts on how he stays humble and how that drives Loom Security's culture from the top down.

Watch Recording
On Demand

Why Chuck. Why Loom.

Our Founder & CEO Chuck Crawford shares his history and why he decided to jump back into the game and build Look Security.

Watch Recording
CINQUE
See It Live

Ready to see CINQUE in action?

Request a personalized demo with our team and discover what unified, AI-driven, persona-based security posture management looks like for your environment.