Resources

Curated content for the compliance connoisseur: We cover the latest on frameworks, risks, and security trends.

Show filters

All

Blogs

Tags
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Upcoming
On-demand
SOC 2
Blog
What is a SOC 2 bridge letter?

SOC 2 bridge letters can make or break your compliance program. Find out what they are and when you'll need to use them.

Compliance
Cybersecurity
Upcoming
On-demand
SOC 2
Blog
The SOC 2 Compliance Checklist

Simplify and expedite your company’s SOC 2 audit and report process with Vanta. This checklist walks through the SOC 2 attestation process.

Compliance
Upcoming
On-demand
ISO 27001
Blog
The importance of choosing the right auditor

Wondering how to choose an auditor? Vanta's cybersecurity and data privacy expert Matt Cooper offers a few words of advice.

Experts
Compliance
Risk Management
Partners
Upcoming
On-demand
Compliance
Blog
Why PCI compliance matters for SaaS startups

Learn how big data and fintech companies can prove their security posture with PCI DSS compliance certification and why it doesn't have to be as complicated as you might think.

Startups
Compliance
Upcoming
On-demand
Security
Blog
Vanta’s 6 principles for pragmatic startup security

Thinking your startup's security isn't where it should be? These six principles will get you on the right path.

Cybersecurity
Startups
Features
Experts
Upcoming
On-demand
SOC 2
Blog
How to identify and close gaps in SOC 2 compliance

If something is missing in your SOC 2 compliance, it’s important to plug the gap as soon as possible. Learn how to uncover SOC 2 issues and keep your business safe.

Compliance
Cybersecurity
Features
Upcoming
On-demand
ISO 27001
Blog
Risk assessment 101: Working backwards from the controls

Matt Cooper, Principal, Cybersecurity and Data Privacy, shares how to work backwards with a controls framework for assessing risk in order to meet the requirements for ISO 27001 compliance.

Risk Management
Cybersecurity
Experts
Upcoming
On-demand
ISO 27001
Blog
SOC 2 and ISO 27001: Take advantage of common criteria mapping for compliance

When you use common criteria mapping for compliance, you can achieve multiple certifications without doing double the work. Streamline your SOC 2 and ISO 27001 goals with this helpful strategy.

Compliance
Cybersecurity
Features
Upcoming
On-demand
SOC 2
Blog
Who is responsible for SOC 2?

Who should be responsible for the work involved in SOC 2 attestation? Learn the differences between the technical and non-technical needs when preparing for SOC 2 compliance.

Compliance
No results found 🤷