Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Custom Frameworks to the Vanta Platform

As organizations grow in size and complexity, so do their security and compliance needs. While Vanta's library of controls and supported frameworks are extensive, eventually, you may wish to use your internal expertise to build a framework Vanta doesn't support or create custom controls. ‍ Today we are excited to introduce custom frameworks and enhancements to custom controls to help you improve your workflows, organize your security commitments, and manage your work at scale. ‍

The Differences Between SOC 2 vs. ISO 27001

SOC 2 and ISO 27001 are compliance frameworks commonly required of organizations that house data or store sensitive information. Both standards focus on information security management, but they have some key differences in their approach and scope. Let’s take a closer look at the differences between SOC 2 and ISO 27001, and see if one or both are right for your organization.

Meet Mick England: The DPO that Led Robin's SOC 2 & ISO 27001 Compliance

Out of his 29 years of cloud and security experience, Mick has been with Robin for 6, leading their internal compliance operations and making sure that their customers’ data is secure. Robin needed to get SOC 2. They also wanted a way to answer security questionnaires faster. Continue on to see how Mick was able accomplish both.

Arctic Wolf Helps Edmentum Have Confidence in Their Data Confidentiality

As a provider of digital, online curriculums for personalized learning experience both across the US and around the globe, the pandemic caused Edmentum to scale, fast. That growth in business required a new dedication to security as the organization needs to keep their clients’ data safe while maintaining regional, state, and federal compliance.

What Is MAS TRM?

All financial institutions operating in Singapore are required to comply with the MAS TRM guidelines in order to operate legally. In order to ensure the safety of their operations, customers, as well as the wider financial system, financial institutions are required to conduct regular risk assessments and implement appropriate risk management measures.

Most Common HECVAT Violations (And How to Avoid Them)

The HECVAT (Higher Education Community Vendor Assessment Toolkit) was developed by the Higher Education Information Security Council (HEISC) as an initiative to help higher education institutions better protect their data, prevent the risk of data breaches, and measure the cyber risk of third-party solution providers.