Navigating the Digital Personal Data Protection (DPDP) Act
On August 9, 2023, India took a significant leap forward in data governance with the enactment of...
Point-in-Time or Side-Scanning vs In-Memory Scanning
Sensitive Data, including PII, is at risk of being exposed, compromised and eventually leaked based...
Top Cybersecurity Measures Under NIS2 Directive
As the NIS2 Directive marks a new era of cybersecurity requirements in the EU, discover the...
Essential Steps for GDPR-Compliant Data Transfers
Cross-border data transfers have become standard practice in today's globalized world. However,...
Proactive Measures for Data Security: Remediative Steps to Prevent Data Breaches
From financial loss, and reputational damage, to legal consequences, there’s no denying a data...
Borneo Announces Data Risk Remediation for Confluent Kafka Streams
Today, Borneo Data Inc., the leader in AI-Native data security, announced the availability of...
Lowering Data Costs and Improving Compliance with Modern Data Security
Today we are seeing an explosion of data being used and stored as analytics are powering...
National Health Service (NHS) Under Siege by Russian Threat Actors
The NHS (National Health Service) in UK is investigating one of the ransomware attacks and...
A Taste of Working Life @ Borneo
Today marks the end of my 5-month Internship with Borneo Data
Borneo, named after an island in...
Blinded by Rainbows
Blinded by rainbows
Making Compliance Auditing simple with Borneo’s Global Search
When it comes to auditing data resources it becomes a painful task of exploring through profuse...
How I started sharing design resources for free and why you should too.
I remember the first time I shared a design file for anyone to download for free. I was working on...
Securely managing AWS credentials using AWS Vault
Our mission at Borneo is to build guardrails for the new data economy. We thus take the security of...
Expand discovery with developer secrets & send alerts to the right teams for immediate action — Borneo For Corp Apps 1.6
Borneo is pleased to announce Borneo for Corporate Apps 1.6, which is now available to customers.
E2E Support for GDrive Data Exfiltration Prevention in Corp Apps release 1.8
Google Drive Sensitive Data Discovery, Classification, and Remediation
ML/AI Powered Sensitive Data Inspection: First Principles Thinking (Part 1)
Traditional rule-based approaches have failed cumbersomely because they lack the ability to...
Prevent data exfiltrations across your Corporate SaaS Applications using non-blocking remediation workflows: Borneo release 1.7
Borneo's latest 1.7 release gives your end-users improved remediation features for you to achieve...
Data Security as a Vector
Over the weekend, I was reflecting on why certain companies are way more successful than others and...
Borneo for Good!
We are a couple of hours from our company's monthly All Hands, and our CEO and CRO pull me into a...
Challenges and Strategies for data leak investigations (Part 2/2)
As we discussed in Part 1 of our story Why is Data Investigation Critcally Important In The Age Of...
Privacy Observability — Why Is It Needed Urgently?
Data here, data there. There is so much data in so many parts of the organization. As a compliance...
New Updates: Data Governance for Snowflake Data Warehouses, Automated Governance Cataloging — v1.8
New solutions and features for Privacy Teams, Data Owners, DevSecOps, and Data Engineers
Borneo featured in CB Insights
The next generation of cybersecurity firms is emerging to combat the data breaches globally, which...
How Borneo Handles Production Deployments for our customers for the modern cloud
And how it will benefit our customers in the long run
The Hidden Costs of Volume, Velocity, Variety — Privacy Debt
Data, data, data… what are your hidden costs?
An inside look into our Virtual Hackathons
At Borneo, as we are a fully-remote company, we have already held two virtual hackathons, one in...
A Guide to Privacy Engineering APIs — Challenges and Guardrails
Borneo’s developer-first approach for fast-moving teams
Exploring the Log4Shell Vulnerability
How we determined whether our software is susceptible to the Log4Shell vulnerability, crafted a...
My Borneo Journey — going from a startup founder to CEO
We have a bold mission at Borneo, and every bold mission is shaped by learnings from our life...
An approach: Solving PII detection in Unstructured Data with AI/ML
Challenges in Unstructured data
A lot of PII is contained in unstructured forms of information and...
10x Engineer — Learning your tools and other hacks
We asked across our software engineering muscles what are some productivity tools, tips, and tricks...
Why Is PCI DSS So Hard?
Remote Work @ Borneo (from day 1)
Borneo has been fully remote from day 1, and this is because the company started with individuals...
Secrets and Credentials are much easier to Steal in the Cloud — What to do about it?
And why current detection solutions don’t work well.
How we make virtual happy hour fun and engaging
Happy hours can be quite literally described as the window to your company -your company's culture,...