Browse our library of resources to stay up to date with data security best practices and hear expert opinions from leaders in the field.
With over 480 million records breached in 2022, it’s more important than ever to lock down your data and protect your business from data leaks.
Intellyx, the first and only analyst firm dedicated to digital transformation, today announced that Metomic has now won the 2023 Intellyx Digital Innovator Award.
Our May product update includes a new detection preview and improvements to our Assets page
There is a danger that any founder can want too much too fast from their business. But with hypergrowth comes a whole lot of risks that need to be handled carefully.
Metomic can help you ensure your business is GLBA compliant. Here's how.
Experiencing a data leak is a terrifying prospect that most security teams dread. Protecting yourself against data leaks should be one of your biggest concerns, otherwise you could be facing catastrophic consequences for years to come.
Taking steps to minimise the data you hold on to could be the right solution for you. This article will tell you the right way to go about it.
As a business, you have a duty to keep your customers’ PII & PHI secure. Find out what they both mean for you in this article.
Since the pandemic, the rise of remote working has seen employees enjoy a better work/life balance and the freedom to work from wherever they want. But while companies have reaped the benefits of reduced overheads, remote working has raised the issue of new cybersecurity threats that could wreak havoc on their businesses.
As security teams grapple with the new threats facing their companies, programs like ChatGPT can present them with challenges they may never have been confronted with before.
It can be difficult to know where to start when it comes to DLP. Creating a DLP strategy is the first step to ensuring your data stays secure.
Data Security Posture Management (DSPM) focuses on the data layer of a business, giving security teams visibility over the data in their ecosystems, such as sensitive PII and PHI, as well as company secrets.
Organisations can call on a multitude of data points to track their security posture. But that doesn’t mean they should.
You may have heard of the human firewall; it’s a term that’s starting to gain traction in the cybersecurity space but what exactly does it mean?
Bringing a security posture into your organisation can make a huge difference when it comes to minimising the cybersecurity risks to your business.
Your team could be crucial in helping you protect your sensitive data. Here's how to educate them on DLP.
If data security isn’t one of your top priorities, it definitely should be. It not only benefits your customers; it can benefit you too.
Making security a key part of your culture can help your team become more aware of the risks posed by cyberthreats.
As easy-to-use and convenient as Slack is, it’s near-impossible to see or control what information is being shared across hundreds of channels.
Find how you can make Slack more compliant and avoid costly data breaches with our Slack whitepaper.
This month, we’ve implemented new filters and upgraded your alerts so it's even easier to protect your sensitive data.
Sensitive data is spreading uncontrollably across SaaS applications - here's what you can do to control it
In a matter of seconds, the free tool identifies “high-risk” files that may include sensitive data stored within a Google Drive account and who has access to them
To prevent a repeat of what was a fairly damaging year, it’s important to review some of the more notable data breaches of 2022 and see what we can learn from them.
As a data security solution focused solely on SaaS ecosystems, Metomic will use the Series A funding round to expand into the U.S.
Take care not to give someone outside your company full access to your Notion workspace. CEO Rich shows you how.
Without the right visibility strategy in place, organizations will be exposing themselves to risk beyond just simple data exposure or breach
It’s a one-click scan of your Google Drive account to find those forgotten files that could be putting your security or privacy at risk
This month, we’re talking all about GitHub integrations, detection counts, and our new Head of Product.
Read all about Zego's experience with Metomic, including their discovery of thousands of public facing Google docs
See how the Head of Information Security at Zappi used Metomic to protect their Google Workspace
How CISOs can take the first step towards organisational cyber resilience to reduce their risk of financial and reputational harm
Using helpful Notion features like this one in conjunction with tools like Metomic can help you add an extra layer of protection for your sensitive data.
Google Drive now has expiry access controls that can be set when you’re sharing the document, rather than going in retrospectively to add them. Here's how to use them.
Get a clear understanding of the data protection landscape and what you can do to secure your sensitive data
The Security Director of a US InsurTech company knew he had to find a way to keep sensitive data safe in his fast-growing company. Read more about how Metomic helped him to sleep better at night.
TravelPerk detects and responds to risks with the click of a button using Metomic
Our plans following our $20m Series A round
Join industry experts Cary Vidal & James Moos with Metomic CEO Rich to find out how you can protect your business.
With the rise of SaaS apps making it easy to share documents beyond your company, how do you make sure your sensitive data is secure?
How do you build your most important line of defence - your human firewall? Find out with our latest webinar.
It's easy to share too much in Notion - learn how to keep your workspace secure with this short video from our CEO
Download our handy infographic to find out more about the rise of SaaS apps and how you can stay compliant
Download our datasheet to discover how Metomic can help you minimise the risks to your sensitive data
Because critical data is no longer housed within a company’s own servers, hackers know they’re more likely to succeed with social engineering attacks.