Captain Metomic

Author

Described as tall and good-looking by some, short and sweet by others, no one in the team knows who they are. But they write great blog posts!

Articles by

Captain Metomic

All Articles

What are Social Engineering Attacks and why you need to defend against them

Because critical data is no longer housed within a company’s own servers, hackers know they’re more likely to succeed with social engineering attacks.

Information Security

How Metomic Can Reduce Your Risk of Data Exposure

Collectively, we’ve helped companies prevent over 2.5M data breaches and Metomic does it without inundating teams with noisy alerts.

Information Security

The risk of not knowing where your data is

Without the right visibility strategy in place, organizations will be exposing themselves to risk beyond just simple data exposure or breach

Legal & Compliance

Why data visibility and asset management should be a priority for CISOs

How CISOs can take the first step towards organizational cyber resilience to reduce their risk of financial and reputational harm.

Information Security

Data Minimization and Storage Limitation

Sensitive data is spreading uncontrollably across SaaS applications, so check out our 101 on data minimization and storage limitations.

Information Security

First Look - the American Data Privacy and Protection Act

A bipartisan draft bill has been released outlining US federal standards governing how companies collect, process, transfer and protect data.

Legal & Compliance

Targets for data breach or data leak detection & remediation

‍What does ‘good’ look like when it comes to detecting and remediating security violations?

Information Security

What cybersecurity metrics should a startup focus on?

Organizations can call on a multitude of data points to track their security posture. But that doesn’t mean they should.

Information Security

Why cybersecurity training needs to change

Employees continue to pose one of the biggest threats to IT security. So why do organizations persist with training methods that don’t work?

Information Security

The first 100 days of a startup CISO

Information security at a startup presents unique challenges. We look at what a newly appointed CISO should prioritise.

Information Security

Sensitive data in Snowflake

When finding sensitive data & PII amongst the terabytes of data flowing constantly to Snowflake becomes tech companies' most daunting data challenge.

Information Security

Sensitive data in Slack

As easy-to-use and convenient as Slack is, it’s near-impossible to see or control what information is being shared across hundreds of channels.

Information Security