Company Updates,
Security and Technology News

Try VGS for free Contact Us

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader May 21, 2019

Customer Spotlight Zero Data Hero - Trim

Alexandr Florinskiy Alexandr Florinskiy May 15, 2019
secure forms style

Styling Secure Form Fields with VGS Collect

Christina Monets Christina Monets May 13, 2019
vgs fiesta 1

Lessons We Learned From Organizing Our 3rd Annual Company Retreat

gordon-young Gordon Young May 8, 2019
Сompliance Academy

Introducing Compliance Academy — A resource to learn about PCI, SOC2, GDPR & CCPA

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader May 6, 2019
yofii zero data hero

Yofii — Zero Data Hero Customer Spotlight

Peter Curley Peter Curley May 1, 2019

Opting Out of the Regulation Arms Race with Zero Data

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader April 25, 2019

Brex - Zero Data Hero Customer Spotlight

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader April 23, 2019

Announcing Very Good Security’s Zero Data Mission

Fang Pen Fang Pen April 2, 2019

Prevent a Million Dollar Data Breach with VGS in 10 Minutes

Yuriy Yunikov Yuriy Yunikov February 13, 2019

Building a fine-grained permission system in a distributed environment: Architecture

Irina- ziakhor Irina Ziakhor February 4, 2019

How to securely capture your users’ sensitive data with VGS Collect

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader December 16, 2018
Data Security Privacy
data security

Preserve Privacy, Promote Progress: The New Data Paradigm

Max Lobur Max Lobur December 4, 2018
DevOps Kubernetes K8s

Kubernetes Multi-AZ deployments Using Pod Anti-Affinity

Bohdan Khablenko Bohdan Khablenko November 27, 2018
Java Maven OWASP

How to Avoid Using Components with Known Vulnerabilities

Yuriy Yunikov Yuriy Yunikov November 20, 2018
access credentials rotation

Best Practices for Access Credential Rotation at VGS

VGS VGS November 8, 2018

VGS Wins SINET 16 Innovator Award

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader October 11, 2018

VGS Hires Former Visa Exec as it Expands into Enterprise

Yura Shafranyuk Yura Shafranyuk September 11, 2018

How to Make the Most of VGS Access Logs

Yuriy Yunikov Yuriy Yunikov September 3, 2018

How to Secure Sensitive Data Sent From Android Apps

Mahmoud Abdelkader Profile Image Mahmoud Abdelkader August 28, 2018
Security News

A Very Good Approach to Security

Oleg Yatskiv Oleg Yatskiv August 20, 2018
Java Spring

How to Achieve PCI Compliance with 3 Lines of Code Using the Spring Framework

marshall-jones-r Marshall Jones July 26, 2018

VGS Completes 2018 PCI-DSS 3.2

uf.jpg Ulyana Falach July 9, 2018

Quick 3-Click Integration with VGS

gordon-young Gordon Young July 2, 2018

Workstation Management

gordon-young Gordon Young June 15, 2018

PCI Compliance, a Modern Approach: Audit Scope Reduction

gordon-young Gordon Young May 27, 2018

Securing IOT: Stream Level Redaction

gordon-young Gordon Young May 24, 2018

Threat Modeling for Data Protection

uf.jpg Ulyana Falach December 13, 2017

User Management Feature Release

marshall-jones-r Marshall Jones September 6, 2017

Proxy Secure Logger

marshall-jones-r Marshall Jones August 21, 2017

Proxies Demystified