article thumbnail

How To Get SOC 2 Certification For Software Companies

Audacix

It's one of the last steps on your journey to building a culture of security within your software development team. At least annual CIS benchmarking via cloud console penetration testing services. Think of SOC 2 certification as more of a stamp of approval once all your various security structures are in place.

article thumbnail

State of the Cloud 2019: Europa Edition with Alex Ferrara, Bessemer Venture Partners (Video + Transcript)

SaaStr

Before I joined the venture capital industry many years ago, I was a software developer, and I worked for a startup around the 2000 time period. Many of these are names that you know, and this is actually the largest we’ve seen in history. I think it’s a really staggering stat.

Cloud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bulletproof your software with these 12 best application security tools (SAST, DAST, CSPM & WAF)

Audacix

Don't worry if you're not a cybersecurity expert; we'll break it down in simple terms and provide real-world examples to help you understand the key concepts. How do you secure an application software? is a static application security software that analyzes your source code to identify potential security vulnerabilities.

article thumbnail

SaaStr Podcast #402 with HackerOne CEO Mårten Mickos: “Customers Want Value + Simplicity: The Must Haves to Deliver”

SaaStr

You most likely are linking to external sources of data, external software packages that you embed in the product and turn into what you’re delivering to the customers. Marten Mickos: Similarly, at our company, at HackerOne, you can call us a two sided marketplace, you can call us a cybersecurity company or SaaS business.