Real-Life Lessons in Breach Response
Using real-life examples, a breakdown of how to respond to a breach in a manner that supports customer trust.
Using real-life examples, a breakdown of how to respond to a breach in a manner that supports customer trust.
We’re excited to announce the launch of AI-powered Questionnaire Assistance, SafeBase’s “last-mile” support designed to significantly reduce the time and manual effort required to complete security questionnaires.
Earlier this month, the team at SafeBase was honored to host the first annual Women in Trust Summit, bringing together more than 50 women leaders in cybersecurity, privacy, and trust. Here are five key learnings from the event.
To bring our customers together, we created the Trust Alliance. Today, that community has officially launched with the opening of our Community Forum, a space to come together to discuss the future of customer trust, best practices, and what’s top of mind in the cybersecurity industry.
Among the world’s enterprise companies, the security review has an important place. Learn how Asana has revolutionized the process of security reviews.
Learn how SafeBase is leading the industry in their approach to A.I. safety and security using security questionnaire automation and more.
SafeBase announced that we are acquiring Stacksi, the A.I.-powered security questionnaire automation platform. The acquisition marks one of our biggest investments to-date in creating a world with seamless security reviews that are a positive experience for security teams, sales teams, and their buyers.
Despite providing buyers and customers with all the information they need to make a buying decision, unavoidable privacy questions come up that security pros should know how to answer. During a recent call with our friends at DataGrail, we discussed some of the privacy questions that SafeBase’s customers receive the most often from their customers.
Learn how by building and leveraging a Trust Center you can get ahead of the security review process, reducing the potential for buyers to go dark or for competitors to scoop your deal.
Showcasing your Trust Center publicly is an opportunity to demonstrate your commitment to transparency, and is likely to give you a leg up on the competition.
Learn how to respond to information security incidents effortlessly. Discover best practices, key steps, and essential strategies to protect your data and minimize the impact of cybersecurity breaches.
Learn why building customer trust is crucial for businesses in the digital age. This blog explains the importance of online security, reputation management, and data privacy.
Learn how to work remotely securely with our comprehensive guide on best practices for remote work. Find tips and strategies to protect your devices and data from cyber threats.
Learn about the latest cybersecurity threats and best practices for protecting yourself and your organization. This blog covers everything from malware and phishing to ransomware and data breaches.
Learn why customer trust is crucial to building a strong customer base and maintaining a successful business. Discover the impact of trust on customer loyalty and reputation management.
Learn why effective third-party risk management is critical for information security. Discover outsourcing risks, the need for a robust risk management strategy, and how to protect your sensitive data.
This post is a deep dive into our auditing process, the strategies that proved effective, and some key lessons that we took away.
Meet Chris from our People and Culture team in this SafeBase employee spotlight.
The SafeBase team recently converged on Chicago for our annual company offsite - Read all about it!
Learn more about SafeBase's new Advanced Analytics Dashboard, and how this feature can help your organization assess "Security-Influenced Revenue."
Human behavior plays a critical role in information security. Review our practical tips on improving security awareness and reducing the risk of cyber-attacks.
“Your Third-Party Risk Management Program Is Bad and You Should Feel Bad” from RSAC 2023 is a must-watch session for any cybersecurity leader. Check out this blog for some of our top TPRM takeaways, and the full session video.
Learn 5 effective ways to build customer trust, boost customer loyalty, and enhance your reputation management. Discover practical tips to help businesses gain and retain customers' trust.
Enhance your trust communication strategy with a public knowledge base! Learn more about this new feature and how to get started.
Discover how encryption helps protect sensitive data and prevent unauthorized access. Learn about the importance of encryption in information security and how it works.
Going on vacation this summer? Here are a few ways you can use your SafeBase Trust Center to minimize pings and maximize relaxation time.
SafeBase Enterprise users can now streamline user identity management with SCIM!
AI is transforming cybersecurity. Discover the potential benefits & risks of AI adoption and how to leverage it to strengthen your defenses against cyber threats.
Learn how to use Trust Center Updates for effective communication when vulnerabilities pop up, new subprocessors are added, or when there's simply exciting security news to share!
We are excited to announce that Inc. Magazine has selected SafeBase as one 2023's Best Workplaces!
With the development of generative AI, it's important to be proactive when it comes to security. Here are a few tips to help your company think about responsible use of Generative AI.
Learn how SafeBase can help your organization go beyond a static Trust and Security page.
Learn how the Security team at SafeBase was able to greatly reduce the need for passwords for employees and SaaS services.
Learn more about the SafeBase Trust Alliance, the new community for trust-minded organizations.
Let's explore five best practices used by SafeBase customers within their Trust Centers.
SafeBase co-founder and CEO Al Yang took the stage to show how SafeBase is removing the friction from B2B security reviews. Check out his full pitch here!
Matt Szczurek, SafeBase's Solutions Engineer, shares his unique perspective on a cyber readiness mindset developed while serving in the United States Air Force.
Let's take a look at a few ways that sales teams can leverage security information to impress prospects, win deals, and build long-lasting customer relationships.
G2, the world’s largest and most trusted software marketplace, named SafeBase a category leader in their Spring report.
We explore the concept of a "customer trust" team and how it differs from a traditional security team. Learn more in this blog.
This prestigious contest highlights 10 of the most innovative young cybersecurity companies.
Discover the game-changing potential of Software Bill of Materials (SBOM) in cybersecurity and gain a full understanding of why you need to adopt their use.
Discover the highlights of SafeBase's Customer Advisory Board Scottsdale Offsite Meeting. Check out an event overview including recap, strategies, and future plans.
Unlock the power of Safebase with Webhooks. Seamlessly integrate and automate workflows with our latest feature update. Enhance productivity and streamline operations.
Be vigilant this tax season and don't fall prey to hackers or scams. We've compiled a few tips to help keep you secure.
Let’s explore how SafeBase is striving for a world without security questionnaires.
Defining "customer trust" and its critical role in organizational success. Learn how to build customer trust through cybersecurity best practices.
Whether your customer trust program is well-established or just getting started, we’ve curated a list of commitments to help you on your journey.
What exactly is a Trust Center? How is it different from a security profile, vendor profile, or security status page? Does your org need one? This blog has all the answers.
Gain valuable insights from our webinar recap on building trust with enterprise customers. Learn effective strategies to establish strong relationships and foster trust.
This year, SafeBase customers made tremendous strides in building and maintaining trust with their customers and stakeholders.
The ability to break out data privacy information was our most requested feature of 2022, and now it's here!
Introducing granular access and expiration controls by SafeBase. Enhance your Trust Center with precise user access management and expiration settings.
Discover the professional journey of Marisa DiMuro in our Employee Spotlight. Learn about her expertise and contributions to SafeBase's mission. Get inspired by Marisa's story today!
SafeBase recently appeared on the CISO Series live show "Super Cyber Friday" and the podcast "Cyber Security Headlines." Check out our recap here!
We are so excited to announce that SafeBase Enterprise customers can now sync Trust Center data directly to Snowflake, BigQuery, Redshift, S3, and other major data warehouses - with no code required.
Our customers shared a few cybersecurity tips with us. Take a look!
Get inspired by Matt Szczurek's journey in our Employee Spotlight. Learn about his expertise and the valuable contributions he brings to SafeBase. Discover Matt's story today!
What was the difference? More of our vendors have a SafeBase portal!
Get to know Orel Regev in our Employee Spotlight. Discover the journey, expertise, and contributions of this exceptional team member at Safebase. Learn more about Orel now!
We love seeing all the new ways customers are using SafeBase - here are a few of our recent favorites.
Learn how SSO is dramatically changing how businesses manage user identities and keeping your personal information safe.
From the RSA Conference to Gartner’s Security and Risk Management Summit, SafeBase was there!
Safebase proudly announces its SOC 2 compliance. Learn how we prioritize data security and meet industry standards to safeguard your information.
Unveiling Safebase's Subprocessors feature. Be more transparent while reducing manual work with our subprocessor management solution. Learn more and optimize your operations today!
Establishing a healthy security culture is crucial whether you’re a startup or a Fortune 500 company. Discover how with SafeBase’s blog.
Discover how the adoption of the YubiKey is revolutionizing online security. Strengthen your defenses and safeguard your digital world with YubiKey.
Uncover the power of Safebase's Multi-Product feature. Explore how this solution allows large enterprises and conglomerates to communicate trust. Learn more here!
Let’s take a deeper look at the 3 elements of data that organizations are consistently working towards securing.
Gain insights from security professionals on building a Trust Center. Discover best practices and learn how to make security assessments less time-consuming.
Funding led by NEA to help companies speed security reviews with self-serve access.
Exciting news! Safebase proudly announces our $18 million Series A funding round. Explore how this investment will fuel our growth and innovation. Read more here!
Discover valuable insights and lessons learned by CIOs and security professionals on automating your GRC program. Optimize efficiency and streamline processes. Read now!
Discover the importance of 3rd-party risk in SaaS and learn why it matters for your business. Watch the webinar now!
In this post we take a deeper look into the Shared Information Gathering (SIG) Questionnaire and discuss its benefits during the sales process.
Learn about the newest features available in SafeBase’s Trust Center with the help of the SafeBase blog. Click here for more info.
This page will provide an overview of any information related to the recent Log4j vulnerability that we will be sharing with customers.
In this webinar, our friends at Armanino covered a variety of tips and myths related to the popular SOC 2 audit that many SaaS businesses are required to go through.
Proper Customer Account Management is a critical part of any successful SaaS company. What most organizations fail to do however, is factor security into this process. In this post we highlight several ways that Customer Success teams can use security to improve a customer's perception and trust.
Discover essential tips and strategies for ransomware readiness in Safebase's webinar with Matt Roeckel. Learn how to protect your organization from cyber threats.
During this webinar we spoke with Craig Goodwin, Co-Founder & Chief Product and Strategy Officer of Cyvatar about how a subscription model inspired by Netflix can fundamentally change the way security vendors provide value for customers.
In this post we discuss the rise of Cyber Insurance and its benefits for organizations looking to reduce the impact of security incidents
In this blog we provide an overview of several useful tips for staying secure on the internet.
Introducing a game-changer for security professionals: SafeBase's new Subscribe feature. Read an overview of common use cases for security teams.
During this webinar we will be discussing the typical processes that senior security leaders go through when evaluating software for their organizations.
Our very own Kevin Qiu recently had a conversation with our good friend Grant Wernick from Fletch around the topics of transparency and affordability in the security industry.
We’re excited to host a conversation with Catherine Tanner, CEO of 3P&T Security Recruiting. She has several years of experience in recruiting for security positions ranging from analysts all the way to executives. She takes pride in using her network of Information Security professionals to find the right person to fit with a client's culture and vision for the future. In her words, “Everyone should enjoy going to work as much as I do!”
We recently hosted a conversation with Deidre Diamond, Founder and CEO of CyberSN, a full-service job-seeker and recruitment partner for cyber security. During this webinar we address common topics around the job hunting process for entry level security candidates, including the different types of roles that employers are looking for, the value of certifications and certificate programs, and CyberSN’s upcoming job marketplace launch.
In this blog post we discuss several common standardized security questionnaires that IT and security teams typically use during the vendor due diligence process.
Discover the essential data privacy practices for startups in our comprehensive guide. Safeguard your data and build trust with customers. Read now!
This is Part 2 of the review of cybersecurity tools where we look at how the tools have evolved in response to the increase in frequency and severity of security breaches.
Long gone are the days when a firewall and a set of boxed software were sufficient to fend off the usual computer attack. Just as the internet has matured, so has everything with it, from the amount of personal and financial data that we store online to the complexity of the networks which carry and store that data.
A look at a couple of relatively open-ended security engineer interview questions that go beyond simple knowledge/definitions.
Fortified against cyber threats with security alerts. See how alerts work on major cloud platforms to empower your security posture like never before.
As users continue to expect more control over their online personal data, many businesses are considering becoming CCPA compliant even when it’s not required.