Meet Chris from our People and Culture team in this SafeBase employee spotlight.
March 31, 2022
We explore the concept of a "customer trust" team and how it differs from a traditional security team. Learn more in this blog.
Be vigilant this tax season and don't fall prey to hackers or scams. We've compiled a few tips to help keep you secure.
Let’s explore how SafeBase is striving for a world without security questionnaires.
Our customers shared a few cybersecurity tips with us. Take a look!
Get inspired by Matt Szczurek's journey in our Employee Spotlight. Learn about his expertise and the valuable contributions he brings to SafeBase. Discover Matt's story today!
What was the difference? More of our vendors have a SafeBase portal!
Get to know Orel Regev in our Employee Spotlight. Discover the journey, expertise, and contributions of this exceptional team member at Safebase. Learn more about Orel now!
Reflecting on those Miami memories.
We love seeing all the new ways customers are using SafeBase - here are a few of our recent favorites.
Learn how SSO is dramatically changing how businesses manage user identities and keeping your personal information safe.
From the RSA Conference to Gartner’s Security and Risk Management Summit, SafeBase was there!
Safebase proudly announces its SOC 2 compliance. Learn how we prioritize data security and meet industry standards to safeguard your information.
Unveiling Safebase's Subprocessors feature. Be more transparent while reducing manual work with our subprocessor management solution. Learn more and optimize your operations today!
Establishing a healthy security culture is crucial whether you’re a startup or a Fortune 500 company. Discover how with SafeBase’s blog.
Discover how the adoption of the YubiKey is revolutionizing online security. Strengthen your defenses and safeguard your digital world with YubiKey.
Uncover the power of Safebase's Multi-Product feature. Explore how this solution allows large enterprises and conglomerates to communicate trust. Learn more here!
Let’s take a deeper look at the 3 elements of data that organizations are consistently working towards securing.