Show more filters

Latest

Company news
Blog
Supercharging Vendor Risk Management: Vanta acquires Riskey

We're excited to announce that Vanta has acquired Riskey to improve security reviews from point-in-time snapshots to continuous, AI-powered assessments.

Company news
Blog
Introducing Vanta Trust Maturity Report: Benchmark your security maturity against 11,000+ programs

We’re excited to release our first-ever Vanta Trust Maturity Report to help you benchmark your security maturity.

Product updates
Blog
Force multiply your team and monitor your entire program with Vanta’s AI-powered Trust Management Platform

Vanta’s new features and functionality supercharge your team and expand coverage across your environment.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
Security
Blog
Understanding Germany's IT Security Act 2.0

In this post, we'll cover the scope and applicability of Germany's IT Security Act 2.0, as well as the new definitions and audit and security requirements for both critical infrastructure operators and digital service providers.

No items found.
Upcoming
On-demand
SOC 2
Blog
How kobalt.io provides big security for small businesses with Vanta

Partnership with Vanta delivers more certifications, happier customers, and business growth for Kobalt.io.

Partners
Service Providers
Upcoming
On-demand
GDPR
Blog
How GDPR and ISO 27001 work together

Learn how GDPR and ISO 27001 compliance overlap and how each standard provides more overall security for your organization together than they do individually.

Compliance
Risk Management
Upcoming
On-demand
Security
Guide / Report
5 Must haves in an automated security platform

Building and security startups is hard. But, it doesn't have to be. Learn the six tips that will not only improve your security, but will make it easier for your team to scale quickly and safely.

Compliance
Features
Cybersecurity
Upcoming
On-demand
ISO 27001
Blog
How long does it take to get ISO certified?

If you're in need of ISO 27001 certification, it helps to understand how long that process will take and what the work will entail. Our experts have put together a timeline for ISO 27001 compliance certification.

Compliance
Cybersecurity
Upcoming
On-demand
ISO 27001
Blog
How much does it cost to get ISO 27001 certified?

What are the costs involved with becoming ISO 27001 certified? We break down all the possible ways that the cost of ISO 27001 certification can add up and share how to minimize expenses.

Compliance
Engineering
Upcoming
On-demand
SOC 2
Blog
Top 5 tips for evaluating SOC 2 security monitoring platforms

Not all security monitoring platforms are created equal. Use these five tips to help decipher which questions to ask in order to determine the right automated security platform for your organization.

Compliance
Cybersecurity
Features
Upcoming
On-demand
ISO 27001
Blog
ISO 27001 for startups: What every startup needs to know

Learn the ins and outs of ISO 27001 compliance for startups and get a better understanding of why compliance helps improve your security posture.

Compliance
Startups
Upcoming
On-demand
ISO 27001
Blog
What is ISO 27001 and why do you need it?

Learn about the basics of ISO 27001 and the benefits of ISO 27001 certification from our security automation specialists.

Compliance
Cybersecurity
Risk Management
Upcoming
On-demand
SOC 2
Blog
SOC 1 vs. SOC 2: Which one do you need?

What’s the difference between a SOC 1 and SOC 2 report and which one does your business need? Learn the details of each to understand which report makes sense for your organization.

Compliance
Cybersecurity
Upcoming
On-demand
CCPA
Blog
CCPA vs. GDPR: What are the differences and similarities?

Noticing a lot of similarities between CCPA vs. GDPR? Find out what the differences are between these two regulations and if you’ll need both.

Compliance
Upcoming
On-demand
Security
Guide / Report
Create continuous security without a security team

Creating a continuous security process within your organization can be complex, especially if you lack time and budget. Learn how to create continuous security without a security team.

Compliance
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.