Leen Blog

Monthly updates with the latest features added, improvements made and bugs squashed.

All posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

'Inside Security' with Nitasha Syed (Lead Product Manager, Vanta)

Learn how to build 'trust' into products

Blog
'Inside Security'

'Inside Security' with Emma Jin (Engineering Manager, Semgrep)

Uncover the challenges of scaling application security & building developer trust

Blog
'Inside Security'

Data Normalization for Security: Why It Matters

Learn how Unified APIs help with data normalization

Blog

Introducing Leen Identity Provider (IDP) Connector Library

Explore key features, use cases and examples

Announcement
Blog

Why Continuous Security Data Collection is Challenging for GRC and Auditors

The challenges of continuous security data collection for GRC platforms and auditors are growing everyday.

Blog

How Leen Powers Cyber Insurance Underwriting

Discover how Leen’s Unified API empowers cyber insurance underwriters with real-time security data to make faster, more accurate risk assessments

Announcement
Blog

Introducing Leen Cloud Security Posture Management (CSPM) Connector Library

Leen’s CSPM connectors, you can optimize cloud security operations and maintain a strong security posture by leveraging powerful integrations across complex environments, all through a single API interface

Announcement
Blog

'Inside Security' with Sundar Vincent (Ex-Sr. Principal Architect - IAM at JP Morgan Chase)

This edition explores the role of security in M&A process

Blog
'Inside Security'

'Inside Security' with Rohan Tandon (Sr. Engineering Manager at Panther)

Dive deep into the evolution of the data sprawl problem within security with Rohan Tandon

'Inside Security'

How GRC Platforms are Leveraging Leen's Unified API for Security Data

Compliance frameworks like SOC 2 and ISO 27001 require ongoing monitoring of security controls.

Blog

'Inside Security' with Victor Baddour (Head of Forward Deployed Engineering at Symmetry Systems)

The role of Forward Deployed Engineers within the context of a DSPM

'Inside Security'

How We Improved Our Testing Pipeline

By leveraging parallel test execution with pytest-xdist and isolating databases with Testcontainers, we drastically improved our testing pipeline's efficiency

Blog

Leveraging OCSF for Enhanced MDR

The alignment of a Common Data Model with the OCSF framework provides MDR providers with a strategic advantage

Opinion

Five Takeaways From The Panel Discussion On "The Future of AI in Security"

The panel features distinguished security leaders who share their thoughts on the subject of future of AI in security

'Inside Security'

How CTEM platforms use Leen to build and scale integrations

With Leen’s support, CTEM platforms can become more agile and customer-focused solutions.

Blog
Announcement

CyberBytes: Making Hard Pivots and Building the Modern Security Data Fabric

Watch Kabir Mathur talk about making hard pivots and building the modern security data fabric on the CyberBytes podcast.

Blog

'Inside Security' with Andreas Haugsnes (Ex-Chief Security Architect at Unity Technologies)

Structuring security teams at various stages of a company life cycle

'Inside Security'

Introducing Leen Vulnerability Management Connector Library

Explore all the key features, use cases and examples of the VMS connector library

Blog

Security Data Fabric: Enabling Scalability and Flexibility

A security data fabric architecture provides both scalability and flexibility by keeping large data sets in their original systems and only copying smaller, critical information, organizations can save costs and adapt quickly to new threats.

Opinion

Benefits of Implementing a Security Data Fabric

Security fabrics boost & enhance data access, analytics and reduce costs for security teams

Opinion

'Inside Security' with Justin Pagano (Director of Security Risk & Trust, Klaviyo)

Building effective GRC within security

'Inside Security'

Introducing Leen End Point Detection & Response (EDR) Connector Library

Explore all the key features, use cases and examples of the EDR connector library

Announcement
Product

Leen Press Kit

Access our press kit, logo and other design assets.

Announcement

Top 5 Challenges of Security Integrations and How Unified APIs Solve Them

Challenges include compatibility issues, resource-intensive development, maintenance and scalability, data consistency and accuracy, and compliance

Blog

Integrations: Build vs Buy

Should engineering teams build integrations themselves or use a Unified API platform?

Blog

The Critical Role of Integrations in Security

Integrations are the cornerstone of building robust security systems.

Blog

Introducing OnRamp: Simplifying Connector Onboarding for Users

OnRamp is our new embeddable onboarding component designed to make creating and updating connections easier

Announcement

Challenges of Traditional Security Data Architectures

Scalability, reliability, and data silos are core challenges in managing security data for companies

Opinion

Understanding Security Connectors: How do they work, their benefits & examples

Explore the benefits and examples of security connectors and how they enhance cybersecurity integrations

Blog

What are the benefits of security integration?

Benefits include enhanced threat detection, streamlined security management, cost efficiency, improved compliance, increased agility, and enhanced collaboration.

Blog

Building Integrations: The Fundamental Starting Point for Engineering Teams

Discover why integrations matter for early-stage engineering & product teams

Blog

8 Benefits of Unified API Integration

Unified API integration simplifies the management of APIs, reduces complexity, and enhances the overall efficiency of business processes.

Blog

'Inside Security' with Varun Prusty (Staff Security Engineer, Asana)

Mastering communication to transform technical expertise into effective security leadership

Blog

Introduction to Security Data Fabrics

An overview article explaining the concept of data fabrics in the context of security, highlighting the need for a more decentralized and scalable approach to managing security data

Opinion

The Need for Unified APIs in Security

Discover why building integrations is challenging for security engineering teams and how unified APIs can provide a solution

Blog

API integration examples

Discover examples of API integrations and understand their importance in enhancing functionality, security, and efficiency across various applications.

Blog

What is API integration?

Explore the essentials of API integration and its benefits for your business. Learn about different types, real-world examples, and best practices for seamless implementation in our comprehensive guide.

Blog

'Inside Security' with Ashwin Ramesh (Detection & Response Security Engineer, Plaid)

Discover why context, storytelling, alignment, and culture are crucial in security engineering.

Blog

The Value of a Common Ontology in Cybersecurity: Enchancing Detection, Response, and Vulnerability Management

A common ontology is a standardized framework that provides a consistent and unified representation of concepts, entities, and relationships within a specific domain or across multiple domains

Opinion

'Inside Security' with Veer Singh (Staff Security Engineer, Infoblox)

Uncovering the journey to security excellence

Blog

Introducing 'Inside Security'

A series dedicated to sharing the stories and learnings from the people who make security possible.

Blog

Unified API vs iPaaS

Unified API is a single API that provides access to multiple services and endpoints, abstracting the complexities of integrating with numerous APIs.

Blog

Leen is SOC 2 Type 2 Compliant

As a security company, we deeply understand and emphasize the critical importance of compliance and security in every aspect of our operations.

Blog

Our Experience Building the Synk Integration

The Synk integration marks a significant milestone for Leen, being the first integration for the AppSec category.

Blog
'Inside Security'

The Importance of Security Engineering

Learn how forward-thinking organizations are shifting from reactive to proactive security measures, integrating robust solutions into every stage of development.

Blog

Introduction to Unified APIs for Security Data: What, Why and How?

Unified APIs are an abstraction layer that easily handles communication with many different APIs and backend data models.

Blog

Why We Named Our Company "Leen"

As an early-stage startup, "Leen" speaks to our commitment to stripping away the excess, to streamlining operations, and to delivering maximum impact with minimal resources.

Announcement

Leen Origins: Our mission and vision for security

Security is fundamentally a data problem. Leen is on a mission to build the best devtools company in the world for security teams.

Opinion
Blog

Leen announces pre-seed funding for its unified data API for security

Leen, a unified data API for cybersecurity, with the mission of becoming the best devtools company in the world for security teams.

Announcement