Resources

Curated content for the trust management expert. Get the latest on security trends, compliance frameworks, and Vanta news.

Show more filters

Latest

FedRAMP
Blog
From pilot to Moderate: Lessons from Vanta’s FedRAMP 20x journey

How Vanta Government Cloud achieved FedRAMP 20x Moderate, with key lessons.

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Company news
Blog
Vanta crosses $300M in ARR as growth accelerates

For years, security teams proved trust once a year during audits, and their customers accepted static PDFs. That era is over.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
SOC 2
Blog
6 Reasons your company needs a SOC 2

Learn why Vanta customers are getting their SOC 2.

Compliance
Cybersecurity
Features
Experts
Upcoming
On-demand
Company news
Blog
Meet the Team!

Ellen, Software Engineering

Engineering
Upcoming
On-demand
SOC 2
Blog
Starting up with SOC 2

Know the SOC 2 controls and how CPAs are involved

Compliance
Startups
Upcoming
On-demand
HIPAA
Blog
What is HIPAA compliance?

What is HIPAA compliance and why might your organization need to learn about it? Find out about what it means to be HIPAA compliant.

Compliance
Cybersecurity
Upcoming
On-demand
Security
Blog
8 Best practices for vendor management

How to work with vendors while maintaining security

Integrations
Cybersecurity
Upcoming
On-demand
Security
Blog
Vendor reviews

What you need to know about vendor reviews and how to streamline them.

Compliance
Integrations
Partners
Features
Upcoming
On-demand
SOC 2
Blog
SSAE 16, SSAE18, SOC 1, SOC2: Understand risk and security

Understanding risk and security assessments

Compliance
Engineering
Features
Risk Management
Upcoming
On-demand
SOC 2
Blog
A Roadmap for the SOC Auditing Process with BARR Advisory

with BARR Advisory

Partners
Compliance
Upcoming
On-demand
Security
Blog
Your business needs a vendor management policy. Here’s how to create one.

What is a vendor management policy, and why does your company need one? Learn here.

Cybersecurity
Compliance
Risk Management
Upcoming
On-demand
SOC 2
Blog
Who can perform a SOC 2 audit?

Who can perform your SOC 2 audit? Who from your organization needs to be involved in the audit? Learn more about SOC 2 audits.

Compliance
Startups
Upcoming
On-demand
SOC 2
Blog
SOC 2 vs SOC 3: What's the difference?

Which does your company need and how they differ

Cybersecurity
Compliance
Upcoming
On-demand
Security
Blog
Cybersecurity is more important than ever

Here’s how SOC compliance fits in

Cybersecurity
Compliance
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.