-
June 27, 2023
How we battle test Bearer CLI
Applications are usually considered battle tested if they’ve been around a while and work as expected in most known situations....
-
June 5, 2023
Announcing GitHub Code Scanning integration
As part of Bearer CLI v1.9.0 release, we’re thrilled to offer improved code scanning integration with GitHub for our open-source security scan....
-
April 13, 2023
Bearer CLI 1.3.0: Migrating rules
This week we released version 1.3.0 of Bearer CLI. It implements our new external rules system, improves TypeScript support, and...
-
April 5, 2023
Bearer CLI 1.2.0: Introducing TypeScript Support
This week we released version 1.2.0 of Bearer CLI. It includes many bug fixes and improvements, along with support for TypeScript....
-
August 3, 2022
How to establish a data security policy that works
Protecting data is about more than making backups and managing access. It involves an ever-evolving set of tools and techniques....
-
June 7, 2022
How our product engineering workflow has evolved
As we explained in a previous blog post, we decided to pivot at the end of summer 2020. Pivoting our products...
-
May 10, 2022
How we usability test our SaaS product
Bearer is a tool to help security and engineering teams protect sensitive data across their development lifecycle. As the product evolves,...
-
March 16, 2022
Your data map is missing APIs and dependencies
In order to ensure compliance with the growing list of personal privacy regulations—like GDPR, CCPA, and PDPA—your company needs to...
-
February 22, 2022
DevSecOps: How to bring data security into the development workflow
DevSecOps refers to the integration of security controls across the whole software development lifecycle. It is first and foremost an organizational...
-
December 14, 2021
How to approach holistic data management
Start-ups committed to becoming something special begin building their new business as they mean to go on, particularly in the...
-
December 9, 2021
You should be automating your data flow map
Mapping and cataloging personal information collected from users is time-consuming. It is error-prone, and relies on hunting down information from...
-
November 11, 2021
How adopting an OKR process has helped the Bearer team stay aligned
Keeping a team aligned isn’t easy. Not every meeting can possibly include every single team member, and updating a multitude...