SecureSlateSecureSlate
Log inGet started for free

Blog

  • all posts (653)
  • ISO 42001 (6)
  • Tools & Software (21)
  • Comparisons and reviews (18)
  • HIPAA (85)
  • SOC 2 (153)
  • GDPR (39)
  • GRC (47)
  • ISO 27001 (191)
  • DORA (7)
  • Vendor Risk Management (4)
  • Guides (10)
  • CJIS (1)
  • Cybersecurity (62)
  • CMMC (4)
  • NIST (13)
  • Compliance (2)
  • CCPA (1)
  • NIS 2 (7)
  • HITRUST (4)
  • Case Study (5)
  • Comparison (6)
  • Engineering (1)

What is the Digital Operational Resilience Act (DORA)? Everything you need to know

Learn what DORA is, who it applies to, DORA’s five pillars, how it overlaps with NIS 2 and common standards, and practical steps to reach compliance.

DORA · May 1, 2026 · SecureSlate Team

What is NIS 2? A guide to navigating compliance requirements

Learn what NIS 2 is, why it matters, who it applies to, key security and incident-reporting requirements, likely penalties for non-compliance, and a practical…

NIS 2 · May 1, 2026 · SecureSlate Team

Who needs to comply with DORA? All your questions answered

Understand who DORA applies to (and who’s exempt), the January 2025 compliance deadline, potential penalties, and a practical four-step path to meeting the…

DORA · May 1, 2026 · SecureSlate Team

Who needs to comply with NIS 2? Scope, requirements, and penalties explained

Who needs to comply with NIS 2? Learn how scope is determined, what in-scope entities must implement, and the penalties and enforcement you should plan for.

NIS 2 · May 1, 2026 · SecureSlate Team

AI Security and Compliance in Healthcare: 5 Practical Tips

Practical guidance for AI security and compliance in healthcare: scope risk, minimize data, tackle HIPAA/HITRUST methodically, automate monitoring, and build a…

HITRUST · Apr 30, 2026 · SecureSlate Team

The Cyber Essentials UK checklist

A practical Cyber Essentials UK checklist that breaks certification into five clear stages—from pre-work to ongoing maintenance—so you can pass confidently and…

cybersecurity · Apr 30, 2026 · SecureSlate Team

Cyber Essentials vs. Cyber Essentials Plus: Key Differences, Costs, and How to Choose

A practical guide to Cyber Essentials and Cyber Essentials Plus: what each level covers, how the assessments differ, typical pricing by org size, and when it’s…

cybersecurity · Apr 30, 2026 · SecureSlate Team

Enhanced VRM unlocks how organizations manage, monitor, and maintain oversight of third-party risk

Move beyond annual check-the-box vendor reviews with continuous monitoring, faster security assessments, and end-to-end remediation workflows—powered by SecureSlate VRM.

Vendor Risk Management · Apr 30, 2026 · SecureSlate Team

GRC Buyer’s Guide: How to use continuous compliance to scale your program

A practical buyer’s guide to continuous compliance: why legacy GRC approaches break at scale, what “continuous” really means, the benefits you can expect, and…

GRC · Apr 30, 2026 · SecureSlate Team

The HITRUST Certification Checklist

A practical HITRUST certification checklist covering pre-work, readiness, remediation, validated assessment, submission, and ongoing compliance for e1, i1, and r2.

HITRUST · Apr 30, 2026 · SecureSlate Team
← PrevNewer postsNext →Older posts

Features

  • Agent
  • Vulnerability Management
  • Continuous Compliance
  • Integrations
  • Streamlined Audit
  • Risk Management
  • Vendor Risk Management
  • User Access Management
  • Trust Management
  • Security Training
  • AI Pentests

Frameworks

  • ISO 27001
  • SOC 2
  • HIPAA
  • GDPR
  • PCI DSS
  • HITRUST
  • CMMC
  • NIST
  • ISO 42001
  • ISO 9001
  • NIS 2
  • EU AI ACT
  • DORA
  • Cyber Essentials
  • Custom Frameworks

Resources

  • About Us
  • Docs
  • Blog
  • Changelog
  • Case Studies
  • System Status

Comparisons

  • Vanta ↗
  • Drata ↗
  • Sprinto ↗
  • Secureframe ↗
  • Delve ↗
  • Scrut ↗
  • Thoropass ↗

Legal

  • Terms of Service
  • Privacy Policy
  • MSA
  • Partner MSA
  • Accessibility
  • Security

Connect

  • LinkedIn ↗
  • YouTube ↗
  • X ↗

Free tools

  • Vendor Check
  • Auditor Check