PinnedTeck WuinBorneoThe Hidden Cost of Volume, Velocity, Variety — Privacy DebtData, data, data… what are your hidden costs?Feb 22, 2022Feb 22, 2022
Teck WuinBorneo4 Curated Insights from Verizon’s 2022 Data Breach Investigations ReportAnd what security engineers can do to prevent data breachesJul 29, 2022Jul 29, 2022
Teck WuinBorneoBorneo Data Stores v2.0 — Migration from ECS to Kubernetes and Compliance De-scoping WorkflowCo-authored by: Sushim Mukul Dutta and Jan HeckingJul 28, 2022Jul 28, 2022
Teck WuinBorneoE2E Support for GDrive Data Exfiltration Prevention in Corp Apps release 1.8Google Drive Sensitive Data Discovery, Classification, and RemediationJun 20, 2022Jun 20, 2022
Teck WuinBorneoPrevent data exfiltrations across your Corporate SaaS Applications using non-blocking remediation…New features and updatesMay 6, 2022May 6, 2022
Teck WuinBorneoBorneo featured in CB Insights list of top early-stage companies reimagining the cybersecurity…The next generation of cybersecurity firms is emerging to combat the data breaches globally, which is expected to cost $10 trillion by…Feb 22, 2022Feb 22, 2022
Teck WuinBorneoNew Updates: Data Governance for Snowflake Data Warehouses, Automated Governance Cataloging — v1.8New solutions and features for Privacy Teams, Data Owners, DevSecOps, and Data EngineersFeb 9, 2022Feb 9, 2022
Teck WuinBorneoEngineer Your Data Before it Engineers YouThe urgency for data engineering and maintenance in your organisationJan 26, 2022Jan 26, 2022
Teck WuinBorneoSecrets and Credentials are much easier to Steal in the Cloud — What to do about it?And why current detection solutions don’t work wellJan 24, 2022Jan 24, 2022