Article

Unlocking Trust: How SOC 2 Validated Our Security Program

April 24, 2024
The Compass:

More posts

Article
Penetration Testing: Why It’s Important + Common Types

Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.

READ MORE
Blog Post
7 min read
What controls are required for SOC 2® reports?

There is nuance to this question, and other well-meaning and very smart people that I respect might give a different answer. But within the volumes of literature that set the standards, the true answer is this: There are absolutely no control requirements for SOC 2 reports.

READ MORE
Blog Post
EdUp AI podcast

Mike DeKock talks to Jason Gulya on the EdUp AI podcast focused on building a blueprint for how colleges can leverage artificial intelligence.

READ MORE