Aquiva blog
What we're learning shipping AI-assisted software on Salesforce and the broader cloud, written by the engineers and architects doing the work.
Salesforce has set a firm May 11, 2026 deadline for five new security controls on Connected Apps and External Client Apps. Here's what AppExchange partners actually need to ship — and what comes after.
A Salesforce data breach can cost mid-market companies millions—often exceeding annual revenue. From stolen customer records and mass churn to downtime, legal fees, and regulatory fines, the real impact is far worse than most leaders expect. This breakdown shows where the costs come from, what real-world breaches look like, and why visibility into Salesforce activity is no longer optional.
Grubhub’s breach shows how stolen OAuth tokens can bypass SSO/MFA in Salesforce. Audit Connected Apps, revoke stale authorizations, and monitor API exports.
Jakub Stefaniak explains why Salesforce API monitoring matters, what to watch for, and how to spot suspicious connected app behavior early.
Learn how AppExchange partners can monitor API activity and ensure Salesforce security with sAPIm. Get real-time insights and protect your Partner Business Org and Packaging Org
Explore Salesforce security best practices, including encryption, API monitoring, and MFA to safeguard your data from evolving threats
It’s Monday, 08:12. Your inbox says: “API usage reached 85% of your daily limit.” On Saturday. Nobody was supposed to be working. You open Salesforce to piece it together and hit a wall. The standard logs show only the last day. Saturday has already fallen off the edge. No reply. No trail. Just an alert...
It might start with something simple. An admin testing a new integration. A developer trying out a handy tool. A user installing a connected app to make their workday easier.These small moments of convenience are exactly why Salesforce is tightening security around connected apps and the Data Loader tool. Beginning late August and early September...
It began, as these incidents often do, with a phone call. An employee, possibly busy and a bit rushed, answered what seemed to be a routine call from IT support. The caller was professional, courteous, and spoke with a sense of urgency. They claimed there was a problem with Salesforce data access and asked the...
Explore the features and benefits of Salesforce’s External Client Apps and how they outperform Connected Apps for seamless integrations.
AppExchange security review is essential and it is important know how to prepare for it, and how to leverage Salesforce’s strict security requirements to ensure your product is ripe for the marketplace. In this article you will learn about all steps and details!
In this third and last blog series about supplier risk management, we will focus on the platform partners and their security risks. Learn how to leverage supplementary technology without jeopardizing your system’s integrity.
Learn how to reduce supply chain security risks through subcontractor risk management and compliance best practices to secure your digital supply chain.
In this Risk Management article, we’ll take a look at what Supplier Risk Management is, why it’s so important, and how to comprehensively assess your business's risks. We’ll also share how Aquiva Labs evaluates partners and platforms we rely on, as well as steps we proactively take to ensure that we are a responsible strategic development supplier to partner with.