Industry FocusData Breach Mitigation: 6 Steps You Can TakeAugust 2, 2022The process of data breach mitigation is responding to cybersecurity events to limit their scope and severity. Having the proper plan can minimize damage.Guest ContributorIndustry FocusData Flow Mapping: Why It Matters and How to Do ItJuly 28, 2022A quick overview of what data flow mapping is, why it matters for data handling and compliance, and the basic steps of how to do it.Guest ContributorIndustry FocusAn In-Depth Guide to Conducting a Data Security AuditJuly 26, 2022Let's explore how to conduct a data security audit. We'll talk about the different types of audits and the steps you need to take when conducting an audit.Guest ContributorIndustry Focus9 Data security best practices and how to implement themJuly 12, 2022In this post we are going to take a closer look at some key data security best practices and some tips for implementing them.Guest ContributorThe Bear DenFive tips to jumpstart your SaaS hiring effortsJune 28, 2022Here's our advice for hiring more smoothly, right from the start with defining the role and understanding the position.Gabriela CardosoPhil HaytonIndustry FocusAPI security best practicesJune 14, 2022Securing an API is more than adding a library and flipping a few switches. Approach API design with a security mindset and follow these tips.Mark MichonIndustry FocusShadow APIs are putting your business at riskJune 14, 2022Shadow IT is nothing new, but with more third party services used to build apps, there's a new threat: Shadow APIs.Mark MichonIndustry FocusHere's why your SaaS needs a DPAJune 14, 2022Do you have DPAs from all of your vendors? Do you offer one to your customers? A DPA is more than an assurance, it's also a business advantage.Mark MichonIndustry FocusWhat is an SLA? Service-Level Agreements and how to find themJune 14, 2022Understand a provider's service level agreement, or SLA, can help ensure that your application is better protected when a problem happens.Mark MichonPrevious6 / 11Next