Blog

Stories, notes, and learnings.

All Articles

Integrating a New System into an Existing Security Boundary

Integrating a New System into an Existing Security Boundary

Ensure a secure and compliant integration when introducing a new system into an existing security boundary.

3 min read
The Anatomy of SSPM Checks

The Anatomy of SSPM Checks

Exploring the crucial components within SSPM security checks and how they secure SaaS environments.

3 min read
SaaS Termination

SaaS Termination

What to look for when you are ending a SaaS contract to maintain security and compliance.

3 min read
A Cybersecurity Program Framework

A Cybersecurity Program Framework

A reusable starting point for building a cybersecurity program using Assess, Manage, and Validate pillars.

3 min read