SafeBase Selected as Finalist for RSA Conference 2023 Innovation Sandbox Contest
This prestigious contest highlights 10 of the most innovative young cybersecurity companies.
This prestigious contest highlights 10 of the most innovative young cybersecurity companies.
A few takeaways from SafeBase's first in-person Customer Advisory Board meeting in Scottsdale.
We're so excited to announce that SafeBase customers on paid plans can now use webhooks to create their own helpful automations.
Be vigilant this tax season and don't fall prey to hackers or scams. We've compiled a few tips to help keep you secure.
Let’s explore how SafeBase is striving for a world without security questionnaires.
Defining "customer trust" and its critical role in organizational success.
Whether your customer trust program is well-established or just getting started, we’ve curated a list of commitments to help you on your journey.
What exactly is a Smart Trust Center? How is it different from a security profile, vendor profile, or security status page? Does your org need one? This blog has all the answers.
Recapping our biggest webinar of the year, and six essential takeaways.
This year, SafeBase customers made tremendous strides in building and maintaining trust with their customers and stakeholders.
The ability to break out data privacy information was our most requested feature of 2022, and now it's here!
Two of our most-requested features are now available!
We turned the tables on our usual author, Marisa, and made her the focus of this month's employee spotlight!
SafeBase recently appeared on the CISO Series live show "Super Cyber Friday" and the podcast "Cyber Security Headlines." Check out our recap here!
We are so excited to announce that SafeBase Enterprise customers can now sync Smart Trust Center data directly to Snowflake, BigQuery, Redshift, S3, and other major data warehouses - with no code required.
Our customers shared a few cybersecurity tips with us. Take a look!
In our next edition of Employee Spotlight, we spoke to Matt from our security team.
What was the difference? More of our vendors have a SafeBase portal!
To kick off our new Employee Spotlight, we spoke to Orel from our product team.
We love seeing all the new ways customers are using SafeBase - here are a few of our recent favorites.
A deep dive into how SSO is dramatically changing how businesses manage user identities.
The process was a breeze. Read on to see how SafeBase completed a SOC 2 Type 2 audit with relatively few issues.
Maintain transparency by showcasing your subprocessors with the newest feature from SafeBase.
Establishing a healthy security culture is crucial whether you’re a startup or a Fortune 500 company.
In this blog post we do a deep dive into one of the most popular tools for securing organizations: the Yubikey.
In this post we take a look at one of the newest SafeBase features: Multi Product.
With so much buzz about ways to protect our data, let’s take a deeper look at the three elements of data that our organizations are consistently working towards securing.
As a vendor, security assessments can be very time consuming. Countless emails, questionnaires, and document requests create bottlenecks in the sales cycle.
Funding led by NEA to help companies speed security reviews with self-serve access.
Our mission - to create a world in which companies with great security programs are rewarded for their efforts.
Automating Governance, Risk, and Compliance (GRC) can help an organization streamline the process and improve efficiencies. But with the growing number of tools and technologies available, where do you start? In this webinar, we discussed new types of tools that can help GRC professionals, reviewed the limitations of these tools, and shared best practices and lessons learned for improving your organization’s GRC program. Hosted by former CIO and CISO Drew Daniels, our panelists included Senior Risk & Compliance Engineer at Instacart Blake Hoge, Director of Security and Compliance at Stride Dwight Doscher, and VP of Security & Compliance at BookNook Jack Roehrig.
Third party risk management is top of mind for CISOs and security professionals today. In the first of this three-part series, CISO and CIO Drew Daniels will join us to talk about why 3rd party risk management is a critical issue for modern SaaS companies and how to navigate it. You’ll learn how to collaborate with Finance and Legal teams to create a sustainable vendor management process for companies of all sizes.
In this post we take a deeper look into the Shared Information Gathering (SIG) Questionnaire and discuss its benefits and ability to reduce custom questionnaires during the sales process.
In this post we take a look at one of SafeBase's newest features: Trust Center Updates.
This page will provide an overview of any information related to the recent Log4j vulnerability that we will be sharing with customers.
In this webinar with our friends at Armanino, we covered a variety tips and myths related to the popular SOC 2 audit that many SaaS businesses are required to go through.
Proper Customer Account Management is a critical part of any successful SaaS company. What most organizations fail to do however, is factor security into this process. In this post we highlight several ways that Customer Success teams can use security to improve a customer's perception and trust.
SafeBase is excited to host a conversation with Matt Roeckel, Senior Director of IT and Information Security at feature flag platform Split. During this fireside chat we’ll be covering a variety of discussion points around ransomware, which has been wreaking havoc across organizations around the world over the past few years. We’ll go over how ransomware operates, elaborate on why it can be so destructive, and most importantly, offer some key tips on how organizations can implement effective security measures to reduce the chance of a devastating ransomware attack. This is a webinar you won’t want to miss!
During this webinar we spoke with Craig Goodwin, Co-Founder & Chief Product and Strategy Officer of Cyvatar about how a subscription model inspired by Netflix can fundamentally change the way security vendors provide value for customers.
In this post we discuss the rise of Cyber Insurance and its benefits for organizations looking to reduce the impact of security incidents
In this blog we provide an overview of several useful tips for staying secure on the internet.
In this post we dive into SafeBase's new Subscribe feature and provide an overview of common use cases for security teams.
We’re excited to host a conversation with Sameer Sait, former CISO of Whole Foods. During this webinar we will be discussing the typical processes that senior security leaders go through when evaluating software for their organizations. We’ll be covering topics such as cold calling, third party vendor reviews, enterprise security needs, and more. See you there!
Our very own Kevin Qiu recently had a conversation with our good friend Grant Wernick from Fletch around the topics of transparency and affordability in the security industry.
We’re excited to host a conversation with Catherine Tanner, CEO of 3P&T Security Recruiting. She has several years of experience in recruiting for security positions ranging from analysts all the way to executives. She takes pride in using her network of Information Security professionals to find the right person to fit with a client's culture and vision for the future. In her words, “Everyone should enjoy going to work as much as I do!”
We recently hosted a conversation with Deidre Diamond, Founder and CEO of CyberSN, a full-service job-seeker and recruitment partner for cyber security. During this webinar we address common topics around the job hunting process for entry level security candidates, including the different types of roles that employers are looking for, the value of certifications and certificate programs, and CyberSN’s upcoming job marketplace launch.
In this blog post we discuss several common standardized security questionnaires that IT and security teams typically use during the vendor due diligence process.
Advice for start-ups that can help them build and operate privacy-friendly solutions.
This is Part 2 of the review of cybersecurity tools where we look at how the tools have evolved in response to the increase in frequency and severity of security breaches.
Long gone are the days when a firewall and a set of boxed software were sufficient to fend off the usual computer attack. Just as the internet has matured, so has everything with it, from the amount of personal and financial data that we store online to the complexity of the networks which carry and store that data.
A look at a couple of relatively open-ended security engineer interview questions that go beyond simple knowledge/definitions.
A review of the findings from setting up alerts across AWS, Microsoft Azure, and Google Cloud.
As users continue to expect more control over their online personal data, many businesses are considering becoming CCPA compliant even when it’s not required.
I recently had the experience of requesting SOC 2 reports from all of our vendors and recap the aggregate learnings from this exercise. Read on to learn about the wide range of outcomes from my SOC 2 report requests.
A password manager is a tool that is used to securely store passwords, credit card numbers, PIN numbers, and other types of sensitive information. These passwords are in turn encrypted by a master password, one that should be complex enough so that no one can guess it.
Have you ever had to wait hours for IT to install a printer for you? Maybe you've lost a company laptop and freaked out about the files on it? What about waiting for IT to approve a new productivity tool with their admin account? Fear not! MDM solutions are here to make that a thing of the past.
A talk with Chris Castaldo and Kevin Qiu.
We've created an easy-to-follow security checklist for early-stage startups that want to improve their security posture. Get the insights you need to make your company and product more secure.
We spoke with the CISO of Paychex about how startups should approach enterprise security.
We spoke with two CISOs about what they expect from startups during the security assessment process.