Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.
Written by us
Putting the right team together can be exciting and challenging. It's something we think about a lot, so we decided to share the superheroes that make up our GRC dream team.
Within the SOC 2 framework, two crucial categories—privacy and confidentiality—play distinct roles in safeguarding sensitive data. Our latest article outlines each category and the differences between the two.
Find out why we don't offer SOC 2 readiness assessments, and how we approach the early phases of a SOC 2 report instead.
Find out why a CPA firm must issue your SOC report and why that's actually a good thing.
Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.
Interviewing auditors is a necessary step in the process as you begin your SOC exam. Here we outline some questions and considerations to help you along the way.
Recommended by us
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
Jemurai shares their ideas and research to present a balanced view on the security implications of using ChatGPT