Posted on January 22, 2020 - by Justin Gratto
Application security features sound like obvious items to put on your product roadmap. But since applications today are constantly changing and evolving, it becomes a never-ending marathon consisting of sprints ...
Read MorePosted on December 28, 2019 - by Justin Gratto
When it comes to developing cybersecurity strategies, planning and assessing existing infrastructure only goes so far. To create an airtight security plan, you also need to view your company from ...
Read MorePosted on August 17, 2020 - by Darren Gallop
For technology vendors, data privacy and security questionnaires are increasingly common. But they are also becoming longer, more complex, and more of a burden for the companies receiving them. ...
Read MorePosted on November 1, 2019 - by Darren Gallop
If your B2B startup is selling to enterprise companies, there is no doubt you are noticing an increased level of scrutiny around your company’s information management practices. You ...
Read MorePosted on September 18, 2019 - by Shannon McFarland
Laird Wilton When the security questionnaire landed in Laird Wilton's inbox, he felt sick to his stomach. He scrolled down the long list of detailed information security questions. His team ...
Read More