Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Brandon Walker4 min read

Webinar Recap: How To Prevent Ransomware Attacks with ScaleSec and Spin.ai

Together, ScaleSec and Spin.AI can create a more secure and ransomeware protected ...
Start Reading
Zach Beeler5 min read

Unlocking the Benefits of a Data Perimeter in AWS

Organizations can unlock cloud security benefits by establishing an AWS data perimeter.
Start Reading
Allison DiPietro3 min read

State Privacy Patchwork

Simple ways to prepare your company for the changing data privacy landscape in the US.
Start Reading
Nick Selpa5 min read

Effective Documentation Using Data Modeling

Repurposing a software engineering technique for documentation to reduce rework and more ...
Start Reading
Allison DiPietro7 min read

CCPA - What You Can (and Should) Do Right Now

With CCPA in full effect, what can companies do to prepare?
Start Reading
Eric Evans5 min read

Data Loss Prevention on Google Cloud

How to use Cloud DLP to secure batch and streaming data.
Start Reading
Jason Dyke13 min read

Encryption in The Cloud Pt. 2

A multipart exploration into cloud encryption. Part 2: Encryption in Google Cloud Storage.
Start Reading
Jeanier Anderson5 min read

Security for the Traveling Consultant

Up your game when on travel, business or personal - Jeanier shares precautions you can ...
Start Reading
Allison DiPietro4 min read

GDPR- So What’s “Compliant,” Anyway?

While GDPR doesn’t yet have a formal, certifying body, it can be part of a robust ...
Start Reading
Jason Dyke10 min read

Encryption in The Cloud Pt. 1

This is the first of a multipart dive into encryption in the public cloud. Part 1 will ...
Start Reading