Resources

Curated content for the trust management expert. Get the latest on security trends, compliance frameworks, and Vanta news.

Show more filters

Latest

FedRAMP
Blog
From pilot to Moderate: Lessons from Vanta’s FedRAMP 20x journey

How Vanta Government Cloud achieved FedRAMP 20x Moderate, with key lessons.

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Company news
Blog
Vanta crosses $300M in ARR as growth accelerates

For years, security teams proved trust once a year during audits, and their customers accepted static PDFs. That era is over.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
Security
Blog
Vulnerability scanning vs. penetration testing: What’s the difference?

Understanding the differences between vulnerability scanning vs. penetration testing is fundamental to a strong security program. In order to achieve certain compliance certifications, you’ll likely have to employ both. Learn about each method, how they work, and when to use them.

Cybersecurity
Upcoming
On-demand
Security
Guide / Report
Vanta’s security and compliance overview

Security and compliance are important to businesses of all sizes. Our security and compliance overview is a compilation of our related content to make it easy for you to learn about everything from security at inception to compliance maintenance.

Compliance
Cybersecurity
Upcoming
On-demand
ISO 27001
Blog
What you need to know about your ISO risk assessment methodology

Struggling with how to develop your ISO 27001 risk assessment methodology? Find out how to prepare your org for ISO compliance.

Compliance
Risk Management
Upcoming
On-demand
GDPR
Blog
How can GDPR compliance software make a difference for your business?

Learn how GDPR compliance software eases the critical compliance regulations and standards for businesses.

Compliance
Upcoming
On-demand
ISO 27001
Guide / Report
Your guide to the stages of ISO certification

What can you expect from your ISO 27001 certification process? Get the details on the stages of ISO certification from security compliance specialists.

Compliance
Cybersecurity
Upcoming
On-demand
SOC 2
Guide / Report
Vanta's SOC 2 compliance guide

A comprehensive introduction to SOC 2 compliance

Compliance
Cybersecurity
Building Trust
Upcoming
On-demand
Security
Blog
9 security tips for startups

Christina Cacioppo, Co-Founder and CEO of Vanta, recently shared her nine security tips for startups when she presented at TechCrunch Sessions: SaaS 2021. Find out her key takeaways for startup success.

Features
Startups
Experts
Upcoming
On-demand
GDPR
Blog
What happens if you break GDPR law?

What are the consequences for GDPR non-compliance? Who enforces GDPR compliance? Learn what the penalties are and how non-compliance can have financial implications for your business.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
Is all compliance regulatory compliance?

Your business doesn’t have to comply with every framework. Find out which compliance standards are considered regulatory and which ones are optional.

Compliance
Upcoming
On-demand
Security
Blog
Point-in-time vs. continuous monitoring for security

Which type of security monitoring should your business choose: point-in-time or continuous monitoring? Learn the pros and cons of each option.

Features
Cybersecurity
Upcoming
On-demand
SOC 2
Guide / Report
Vanta’s guide to SOC reporting

Your guide to SOC 1, SOC 2, and SOC 3 reports. Read more to find out everything you need to know about the 3 reports and how to get compliant.

Compliance
Cybersecurity
Upcoming
On-demand
SOC 2
Blog
3 SaaS sectors most at risk of cyberattacks and how SOC 2 compliance can help

If your startup is in one of these 3 industries, here’s why you should prioritize SOC 2 compliance.

Cybersecurity
Compliance
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.