SPOTLIGHT
Compliance
Achieve EU DORA Compliance: A Clear Path for SMEs
Data security doesn’t just protect your secrets from prying eyes—it’s the foundation for securing your business’s future. For VC-backed startups, it’s not just…
Mona Zimmermann
Compliance
The Ultimate Guide To SOC 2 Compliance & Attestation
It finally happened - you’re out there, building your company, trying to close deals, and a big enterprise customer (or maybe someone in a regulated space) sent you…
Koby Conrad
All articles
Compliance
The Monetary Value of Cybersecurity & Compliance (SOC 2, HIPAA, ISO 27001, etc)
Hi my name is Koby 👋 and for more than a decade I’ve been helping startups invest money into marketing, sales, product, and yes, cybersecurity, to help them grow their revenue…
Koby Conrad
Engineering
Crafting a Custom Windows Auto Updater for Go-Powered Desktop Apps
We developed the Oneleet Agent as a Go-based desktop application that provides a continuous, privacy-respecting monitoring solution for end-user devices. Like any such tool, we needed…
Mohammed Nafees
Cybersecurity
Unveiling the Hidden Challenges of VPC Peering
In today's multi-cloud world, seamless communication between Virtual Private Clouds (VPCs) across different projects is crucial for maintaining a robust and efficient infrastructure…
Mohammed Nafees
Compliance
How quickly can you get a SOC 2 report?
Usually companies aren’t thinking about getting a SOC 2 report until it shows up on a security questionnaire & it is blocking a major deal. You’re trying to sell your product…
Koby Conrad
Compliance
SOC 2 Auditor Certifications: Does it matter who does your SOC 2 report?
The absolute craziest part of the compliance industry is that we have Certified Public Accountants (CPA’s) operating as the auditors for a SOC 2 attestation. Don’t get me wrong, we love our auditing partners…
Koby Conrad
Compliance
Do You Need a Penetration Test for SOC 2 Compliance
Fun fact, not having a penetration test is the #1 reason that our team sees SOC 2 reports fail when going through a security review. This usually stems from a really common misconception…
Koby Conrad
Cybersecurity
Data Security: Threats, Solutions, and Best Practices
Data security doesn’t just protect your secrets from prying eyes—it’s the foundation for securing your business’s future. For VC-backed startups, it’s not just…
Koby Conrad
Cybersecurity
Data Encryption Explained: Benefits, Methods, Best Practices
Data encryption is the process of making readable data unreadable so only authorized people can read it. Data encryption software…
Koby Conrad
Cybersecurity
Data Security Compliance 101: What You Need to Know
Data security compliance means businesses protect sensitive data and follow the rules. It’s the key to avoiding breaches and fines…
Koby Conrad
Cybersecurity
Types of Data Security: Best Practices and Must Haves
Knowing the data security types is essential to protecting your data from threats and cybercrime. Data security…
Koby Conrad
Cybersecurity
Network Security vs Data Security: What’s the Difference?
When it comes to network security vs data security you need to understand the difference. Network security protects data in transit…
Koby Conrad
Cybersecurity
Explain Data Security: What is it? Challenges and Best Practices
Data security keeps your information safe from unauthorized access and cybersecurity threats, though unfortunately, these threats are on the rise.
Koby Conrad
Cybersecurity
Data Security in Transit: Top Strategies and Best Practices
Data in transit is highly vulnerable, as it is particularly susceptible to interception and unauthorized access while being transmitted across networks.
Koby Conrad
Cybersecurity
Cloud Data Security: Risks, Strategies, Solutions
Cloud data security involves protecting your data in the cloud from theft, loss, and unauthorized access. For VC-backed startups and tech companies, this becomes even more important…
Koby Conrad
Cybersecurity
Data Security: Threats, Solutions, and Best Practices
Data security doesn’t just protect your secrets from prying eyes—it’s the foundation for securing your business’s future. For VC-backed startups, it’s not just about preventing breaches…
Koby Conrad
Cybersecurity
Shopping Guide: When do you actually need SOC 2 compliance?
We might just be bad at sales, but probably half of our calls we spend the time trying to convince people not to get a SOC 2 report. The truth of the matter is that SOC 2 is going to cost…
Koby Conrad
Cybersecurity
DNS Security: Top Tips and Tricks to secure your DNS Servers
DNS protection is key to securing your DNS servers from all sorts of cyber threats. In fact, according to the 2023 DNS Threat Report, 80% of organizations recognize…
Koby Conrad
Cybersecurity
Container Cybersecurity: Best Practices and Tools
Container security means keeping your containerized apps secure. Kubernetes security is critical; in recent years it has been adopted by 61% of organizations, and one of…
Koby Conrad
Cybersecurity
Threat Modeling 101
Threat modeling is a proactive way to find and mitigate security threats in the digital world. By systematically finding vulnerabilities it helps you protect your assets…
Koby Conrad
Cybersecurity
What are SQL Injections? And How to Prevent Them
SQL injection is a way to manipulate SQL queries and get or change data without permission. For example, put ‘OR ‘1’=’1’ in an input field and you will bypass login…
Koby Conrad
Cybersecurity
Mitigating Insider Threats: How To Do It
Insiders (employees or partners) can hurt your business, and this is more serious than it seems. A report by Cybersecurity Insiders reveals that the percentage of…
Koby Conrad
Cybersecurity
What is an Advanced Persistent Threat (APT)? Key Facts & Best Practices
An Advanced Persistent Threat (APT) is a long-term cyber attack on a specific network to gain access. Unlike other cyber threats, APTs are sophisticated and carried…
Koby Conrad