<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

Token Security Podcast | Harry Sverdlove Co-founder and CTO of Edgewise Networks

Token Security Podcast | Harry Sverdlove Co-founder and CTO of Edgewise Networks

Justin McCarthy has an in-depth chat with Harry Sverdlove, Co-founder and CTO at Edgewise Networks. They talk about how network security is going
Data Classification Policy Best Practices

Data Classification Policy Best Practices

A data classification policy provides a way to ensure sensitive information is handled according to the risk it poses to the organization.
Confidentiality Policy Best Practices
Confidentiality Policy Best Practices
Your SOC 2 confidentiality policy defines procedures to handle confidential information about clients, partners, and the company. Clients and partners expect you to keep their data secure and a confidentiality policy will demand this same expectation of your employees.Here are best practices to consider when writing your confidentiality policy
Token Security Podcast | Will Charczuk of Blend
Token Security Podcast | Will Charczuk of Blend
This episode we sit down with Will Charczuk, Engineering Group Lead at Blend. Will oversees the service management, runtime & alerting, and operations sub-teams. The crew talks in-depth about rapid deployment in a highly secure environment.
How To Stay SOC 2 Compliant | Advice For This Year's Audit
How To Stay SOC 2 Compliant | Advice For This Year's Audit
It’s safe to say that not many service providers look forward to soc 2 compliance. I'd guess not many of you have the AICPA on speed dial. Whether you're preparing for a Type 1 or Type 2, audits may be perceived as events that you prepare for and complete, but then eventually they go away - at least for a while.
Data Engineering Podcast | Justin McCarthy
Data Engineering Podcast | Justin McCarthy
Listen to this episode here! About This Episode‍ Controlling access to a database is a solved problem… right? It can be straightforward for small teams and a small number of storage engines, but once either or both of those start to scale then things quickly become complex and difficult to manage. ...
Risky Business Podcast - Snake Oilers | Justin McCarthy
Risky Business Podcast - Snake Oilers | Justin McCarthy
Listen to this episode here! About This Episode‍ strongDM Co-Founder and CTO Justin McCarthy has a quick chat with Risky Business' host Patrick to discuss strongDM, which makes a protocol proxy that you can use to provision production services (like Kubernetes and SQL access) to users without them ...
Token Security Podcast | SoFi Head of Infrastructure Peter Tormey
Token Security Podcast | SoFi Head of Infrastructure Peter Tormey
This episode we sit down with Peter Tormey, Head of Infrastructure at SoFi. The crew talks PII, security and what it takes to maintain privacy at-scale for the new model of finance. Peter leads the team that manages and develops a HA Postgres infrastructure using CoreOS utilizing K8s to orchestrate over 100 microservice databases.
Risky Business Podcast - Soap Box | Justin McCarthy
Risky Business Podcast - Soap Box | Justin McCarthy
Listen to this episode here! About This Episode‍ strongDM Co-Founder and CTO Justin McCarthy sits down with Risky Business podcast host Patrick to discuss the strongDM technology, working from home in the current conditions, and making sure that companies have access controls in place while ...
SOC 2 Type 1 Guide | Everything You Need To Know
SOC 2 Type 1 Guide | Everything You Need To Know
SOC 2 Type 1 report assesses the design of security processes at a specific point in time, while a Type 2 report assesses how effective those controls are over time by observing operations for six months.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.