Homepage
Open in app
Sign in
Get started
Borneo
Building the guardrails for the new data economy
Insights
Case Studies
Solutions
Engineering
Culture
About Borneo
Follow
Def Con 31 (2023): Top Talks You Do Not Want to Miss
Def Con 31 (2023): Top Talks You Do Not Want to Miss
Check out this curated list of top talks at Defcon 31!
Ming Hui
Sep 14, 2023
India’s Digital Personal Data Protection Act, 2023
India’s Digital Personal Data Protection Act, 2023
Here is a point-of-view of India’s new data privacy act, DPDP 2023, to help you understand and shape your data compliance.
Ming Hui
Sep 3, 2023
A Taste of Working Life @ Borneo
A Taste of Working Life @ Borneo
Read about my internship at Borneo, an exciting Privacy Automation and Data Security Startup.
Aditya Ghosh
May 29, 2023
Net Zero Vulnerabilities
Net Zero Vulnerabilities
Achieving zero security vulnerabilities with a data-centric approach
Suchit Mishra
May 25, 2023
Blinded by Rainbows
Blinded by Rainbows
The importance of data visibility for security teams in today’s data economy and how you can start with simple frameworks like NIST CSF…
Suchit Mishra
May 14, 2023
Borneo for Good!
Borneo for Good!
We are a couple of hours from our company’s monthly All Hands, and our CEO and CRO pull me into a Zoom call and share some idea’s on their…
Stuti Misra
Dec 13, 2022
Data Security as a Vector
Data Security as a Vector
Over the weekend, I was reflecting on why certain companies are way more successful than others and came across this amazing write up by…
Suchit Mishra
Aug 30, 2022
My Key Learnings in my First 90 days at Borneo
My Key Learnings in my First 90 days at Borneo
I found it surprising that after nearly 6+ years working exclusively with startups in the B2B and B2C space; I still did not have my own…
Vishal
Aug 17, 2022
4 Curated Insights from Verizon’s 2022 Data Breach Investigations Report
4 Curated Insights from Verizon’s 2022 Data Breach Investigations Report
And what security engineers can do to prevent data breaches
Teck Wu
Jul 28, 2022
Borneo Data Stores v2.0 — Migration from ECS to Kubernetes and Compliance De-scoping Workflow
Borneo Data Stores v2.0 — Migration from ECS to Kubernetes and Compliance De-scoping Workflow
Co-authored by: Sushim Mukul Dutta and Jan Hecking
Teck Wu
Jul 28, 2022
E2E Support for GDrive Data Exfiltration Prevention in Corp Apps release 1.8
E2E Support for GDrive Data Exfiltration Prevention in Corp Apps release 1.8
Google Drive Sensitive Data Discovery, Classification, and Remediation
Teck Wu
Jun 19, 2022
Prevent data exfiltrations across your Corporate SaaS Applications using non-blocking remediation…
Prevent data exfiltrations across your Corporate SaaS Applications using non-blocking remediation…
New features and updates
Teck Wu
May 6, 2022
How we make virtual happy hour fun and engaging
How we make virtual happy hour fun and engaging
Happy hours can be quite literally described as the window to your company — your company’s culture, mood and pulse . It forms that…
Ramya
Apr 21, 2022
Azure AD integration as an IDP with AWS Cognito
Azure AD integration as an IDP with AWS Cognito
Amazon Cognito provides authentication, authorization, and user management for your web and mobile apps. Your users can sign in directly…
Hemant Kumar
Apr 7, 2022
Setting Up A US Subsidiary #SaaS
Setting Up A US Subsidiary #SaaS
How-to and whys
Teck Wu
Mar 24, 2022
Secure User Trust to stay ahead in the new data economy.
Secure User Trust to stay ahead in the new data economy.
Prithvi Rai
Mar 20, 2022
How I started sharing design resources for free and why you should too.
How I started sharing design resources for free and why you should too.
I remember the first time I shared a design file for anyone to download for free. I was working on a project that needed a few credit card…
Alborz Heydaryan
Mar 20, 2022
Expand discovery for dev secrets & targeted alerts for immediate action — Borneo for Corp Apps 1.6
Expand discovery for dev secrets & targeted alerts for immediate action — Borneo for Corp Apps 1.6
Borneo is pleased to announce Borneo for Corporate Apps 1.6, which is now available to customers.
Jan Hecking
Mar 16, 2022
Making Compliance Auditing simple with Borneo’s Global Search
Making Compliance Auditing simple with Borneo’s Global Search
When it comes to auditing data resources it becomes a painful task of exploring through profuse data sources across multiple metrics and…
Devesh Kharve
Mar 3, 2022
Borneo featured in CB Insights list of top early-stage companies reimagining the cybersecurity…
Borneo featured in CB Insights list of top early-stage companies reimagining the cybersecurity…
The next generation of cybersecurity firms is emerging to combat the data breaches globally, which is expected to cost $10 trillion by…
Teck Wu
Feb 21, 2022
How Borneo Handles Production Deployments for our customers for the modern cloud
How Borneo Handles Production Deployments for our customers for the modern cloud
And how it will benefit our customers in the long run
Praveen Thuwat
Feb 17, 2022
Automated PII Catalog powered by Datahub for real-time sensitive data observability
Automated PII Catalog powered by Datahub for real-time sensitive data observability
And how it helps Privacy Teams, Data Engineers, and Data Owners solve compliance gaps
Hemant Kumar
Feb 16, 2022
New Updates: Data Governance for Snowflake Data Warehouses, Automated Governance Cataloging — v1.8
New Updates: Data Governance for Snowflake Data Warehouses, Automated Governance Cataloging — v1.8
New solutions and features for Privacy Teams, Data Owners, DevSecOps, and Data Engineers
Teck Wu
Feb 9, 2022
Why is Data Investigation Critically Important In The Age Of Data Breaches?
Why is Data Investigation Critically Important In The Age Of Data Breaches?
A result of exponential growth of data volume and velocity
Hari
Feb 8, 2022
Challenges and Strategies for data leak investigations (Part 2/2)
Challenges and Strategies for data leak investigations (Part 2/2)
Hari
Feb 8, 2022
A Guide to Privacy Engineering APIs — Challenges and Guardrails
A Guide to Privacy Engineering APIs — Challenges and Guardrails
And how Borneo deals with them effectively and easily
Sushim Mukul Dutta
Feb 2, 2022
Engineer Your Data Before it Engineers You
Engineer Your Data Before it Engineers You
The urgency for data engineering and maintenance in your organisation
Teck Wu
Jan 26, 2022
Secrets and Credentials are much easier to Steal in the Cloud — What to do about it?
Secrets and Credentials are much easier to Steal in the Cloud — What to do about it?
And why current detection solutions don’t work well
Teck Wu
Jan 24, 2022
An inside look into our Virtual Hackathons
An inside look into our Virtual Hackathons
At Borneo, as we are a fully-remote company, we have already held two virtual hackathons, one in 29th March 2020 during the massive…
Teck Wu
Jan 20, 2022
ML/AI Powered Sensitive Data Inspection: First Principles Thinking (Part 1)
ML/AI Powered Sensitive Data Inspection: First Principles Thinking (Part 1)
Traditional rule-based approaches have failed cumbersomely because they lack the ability to understand the context in which sensitive…
Teck Wu
Jan 18, 2022
An approach: Solving PII detection in Unstructured Data with AI/ML
An approach: Solving PII detection in Unstructured Data with AI/ML
A pretty decent approach
Teck Wu
Jan 17, 2022
Securely managing AWS credentials using AWS Vault
Securely managing AWS credentials using AWS Vault
To securely manage IAM user credentials, and easily access different accounts in our AWS org, our engineering team use the aws-vault tool.
Jan Hecking
Jan 14, 2022
Why Is PCI DSS So Hard?
Why Is PCI DSS So Hard?
Hardships of achieving PCI DSS and how Borneo can help.
Sushim Mukul Dutta
Jan 13, 2022
My Borneo Journey — going from a startup founder to CEO.
My Borneo Journey — going from a startup founder to CEO.
We have a bold mission at Borneo and every bold mission is shaped by learnings from our life experiences — both successes and more…
Prithvi Rai
Jan 12, 2022
About Borneo
Latest Stories
Archive
About Medium
Terms
Privacy
Teams