Leen Blog

Monthly updates with the latest features added, improvements made and bugs squashed.

All posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Reducing Compliance Costs with Automated Data Collection via Unified APIs

Learn how Unified APIs can reduce compliance costs

Blog

How Unified APIs Simplify Security Integrations for Automated GRC Vendors

Learn why Drata, Sprinto, Thoropass, Scytale & Secureframe use unified APIs

Blog

The Ultimate Cyber Insurance Checklist: Streamline Risk Assessments with Unified API Integration

Streamline cyber risk assessments with our ultimate checklist. Learn how Unified API integration enhances security, data collection, and underwriting efficiency

Blog

Revolutionizing Cyber Insurance Analytics with Unified APIs: Real-Time Insights for Smarter Underwriting

Discover How Unified APIs Enhance Cyber Insurance Underwriting

Blog

Panel Summary: How Security Leaders Evaluate & Procure Tools

Top 10 Takeaways From The Security Panel On How Security Leaders Evaluate & Procure Tools

Blog

'Inside Security' with Jon Ticknor (Co-founder & CTO, Tier4 AI)

Evolution of SOCs and the role of AI in SOC Automation

'Inside Security'
Blog

'Inside Security' with Anshuman Bhartiya (Staff Security Engineer, Lyft)

What goes into building a world-class AppSec program

'Inside Security'
Blog

'Inside Security' with Nitasha Syed (Lead Product Manager, Vanta)

Learn how to build 'trust' into products

Blog
'Inside Security'

'Inside Security' with Emma Jin (Engineering Manager, Semgrep)

Uncover the challenges of scaling application security & building developer trust

Blog
'Inside Security'

Data Normalization for Security: Why It Matters

Learn how Unified APIs help with data normalization

Blog

Introducing Leen Identity Provider (IDP) Connector Library

Explore key features, use cases and examples

Announcement
Blog

Why Continuous Security Data Collection is Challenging for GRC and Auditors

The challenges of continuous security data collection for GRC platforms and auditors are growing everyday.

Blog

How Leen Powers Cyber Insurance Underwriting

Discover how Leen’s Unified API empowers cyber insurance underwriters with real-time security data to make faster, more accurate risk assessments

Announcement
Blog

Introducing Leen Cloud Security Posture Management (CSPM) Connector Library

Leen’s CSPM connectors, you can optimize cloud security operations and maintain a strong security posture by leveraging powerful integrations across complex environments, all through a single API interface

Announcement
Blog

'Inside Security' with Sundar Vincent (Ex-Sr. Principal Architect - IAM at JP Morgan Chase)

This edition explores the role of security in M&A process

Blog
'Inside Security'

'Inside Security' with Rohan Tandon (Sr. Engineering Manager at Panther)

Dive deep into the evolution of the data sprawl problem within security with Rohan Tandon

'Inside Security'

How GRC Platforms are Leveraging Leen's Unified API for Security Data

Compliance frameworks like SOC 2 and ISO 27001 require ongoing monitoring of security controls.

Blog

'Inside Security' with Victor Baddour (Head of Forward Deployed Engineering at Symmetry Systems)

The role of Forward Deployed Engineers within the context of a DSPM

'Inside Security'

How We Improved Our Testing Pipeline

By leveraging parallel test execution with pytest-xdist and isolating databases with Testcontainers, we drastically improved our testing pipeline's efficiency

Blog

Leveraging OCSF for Enhanced MDR

The alignment of a Common Data Model with the OCSF framework provides MDR providers with a strategic advantage

Opinion

Five Takeaways From The Panel Discussion On "The Future of AI in Security"

The panel features distinguished security leaders who share their thoughts on the subject of future of AI in security

'Inside Security'

How CTEM platforms use Leen to build and scale integrations

With Leen’s support, CTEM platforms can become more agile and customer-focused solutions.

Blog
Announcement

CyberBytes: Making Hard Pivots and Building the Modern Security Data Fabric

Watch Kabir Mathur talk about making hard pivots and building the modern security data fabric on the CyberBytes podcast.

Blog

'Inside Security' with Andreas Haugsnes (Ex-Chief Security Architect at Unity Technologies)

Structuring security teams at various stages of a company life cycle

'Inside Security'

Introducing Leen Vulnerability Management Connector Library

Explore all the key features, use cases and examples of the VMS connector library

Blog

Security Data Fabric: Enabling Scalability and Flexibility

A security data fabric architecture provides both scalability and flexibility by keeping large data sets in their original systems and only copying smaller, critical information, organizations can save costs and adapt quickly to new threats.

Opinion

Benefits of Implementing a Security Data Fabric

Security fabrics boost & enhance data access, analytics and reduce costs for security teams

Opinion

'Inside Security' with Justin Pagano (Director of Security Risk & Trust, Klaviyo)

Building effective GRC within security

'Inside Security'

Introducing Leen End Point Detection & Response (EDR) Connector Library

Explore all the key features, use cases and examples of the EDR connector library

Announcement
Product

Leen Press Kit

Access our press kit, logo and other design assets.

Announcement

Top 5 Challenges of Security Integrations and How Unified APIs Solve Them

Challenges of security integrations include compatibility issues, resource-intensive development, maintenance and scalability, data consistency and accuracy, and compliance

Blog

Integrations: Build vs Buy

Should engineering teams build integrations themselves or use a Unified API platform?

Blog

The Critical Role of Integrations in Security

Integrations are the cornerstone of building robust security systems.

Blog

Introducing OnRamp: Simplifying Connector Onboarding for Users

OnRamp is our new embeddable onboarding component designed to make creating and updating connections easier

Announcement

Challenges of Traditional Security Data Architectures

Scalability, reliability, and data silos are core challenges in managing security data for companies

Opinion

Understanding Security Connectors: How do they work, their benefits & examples

Explore the benefits and examples of security connectors and how they enhance cybersecurity integrations

Blog

Top 6 Benefits of Security Integration and Connectors

Benefits of security integration and connectors include enhanced threat detection, streamlined security management, cost efficiency, improved compliance, increased agility, and enhanced collaboration.

Blog

Building Integrations: The Fundamental Starting Point for Engineering Teams

Discover why integrations matter for early-stage engineering & product teams

Blog

8 Benefits of Unified API Integration

Unified API integration simplifies the management of APIs, reduces complexity, and enhances the overall efficiency of business processes.

Blog

'Inside Security' with Varun Prusty (Staff Security Engineer, Asana)

Mastering communication to transform technical expertise into effective security leadership

Blog

Introduction to Security Data Fabrics

An overview article explaining the concept of security data fabrics, highlighting the need for a more decentralized and scalable approach to managing security data

Opinion

The Need for Unified APIs in Security

Discover why building integrations is challenging for security engineering teams and how unified APIs can provide a solution

Blog

10 Common API Integration Examples and Why You Need a Unified API?

Discover examples of API integrations and understand their importance in enhancing functionality, security, and efficiency across various applications.

Blog

What is API integration?

Explore the essentials of API integration and its benefits for your business. Learn about different types, real-world examples, and best practices for seamless implementation in our comprehensive guide.

Blog

'Inside Security' with Ashwin Ramesh (Detection & Response Security Engineer, Plaid)

Discover why context, storytelling, alignment, and culture are crucial in security engineering.

Blog

The Value of a Common Ontology in Cybersecurity: Enchancing Detection, Response, and Vulnerability Management

A common ontology is a standardized framework that provides a consistent and unified representation of concepts, entities, and relationships within a specific domain or across multiple domains

Opinion

'Inside Security' with Veer Singh (Staff Security Engineer, Infoblox)

Uncovering the journey to security excellence

Blog

Introducing 'Inside Security'

A series dedicated to sharing the stories and learnings from the people who make security possible.

Blog

Unified API vs Embedded iPaaS: Key Differences and Feature Comparison

Discover the key differences between Unified API and Embedded iPaaS. Learn how each solution simplifies integrations, their core features, and which one is best for your business needs.

Blog

Leen is SOC 2 Type 2 Compliant

As a security company, we deeply understand and emphasize the critical importance of compliance and security in every aspect of our operations.

Blog

Our Experience Building the Synk Integration

The Synk integration marks a significant milestone for Leen, being the first integration for the AppSec category.

Blog
'Inside Security'

The Importance of Security Engineering

Learn how forward-thinking organizations are shifting from reactive to proactive security measures, integrating robust solutions into every stage of development.

Blog

Introduction to Unified APIs for Security Data: What, Why and How?

Unified APIs are an abstraction layer that easily handles communication with many different APIs and backend data models.

Blog

Why We Named Our Company "Leen"

As an early-stage startup, "Leen" speaks to our commitment to stripping away the excess, to streamlining operations, and to delivering maximum impact with minimal resources.

Announcement

Leen Origins: Our mission and vision for security

Security is fundamentally a data problem. Leen is on a mission to build the best devtools company in the world for security teams.

Opinion
Blog

Leen announces pre-seed funding for its unified data API for security

Leen, a unified data API for cybersecurity, with the mission of becoming the best devtools company in the world for security teams.

Announcement