SecureSlateSecureSlate
Log inSign up

Blog / cybersecurity

  • all posts (526)
  • ISO 27001 (170)
  • GRC (41)
  • Cybersecurity (54)
  • SOC 2 (133)
  • Tools & Software (16)
  • HIPAA (73)
  • GDPR (23)
  • Case Study (5)
  • NIST (10)

The Imperative Role of Vendor Risk Management Tools and Effective Utilization Tips

Unlock Success: Master Your Vendor Risks with These Genius Management Tool Hacks

Cybersecurity · Apr 17, 2024

The Hidden Cyberattack: Government Agency Vanished During COVID-19

A look at attacks on HHS during COVID-19 and how the agency responded—lessons in resilience and response.

Cybersecurity · Feb 8, 2024

Top 9 Ways to Prevent Supply Chain Attacks on Your CI/CD Server

Nine practical ways to prevent supply-chain attacks on your CI/CD server—dependencies, pipelines, and access control.

Cybersecurity · Jan 11, 2024

Stay Secure or Be Sorry: Inside the Data Breaches 2023 Sag

Examining the data breach tsunami.

Cybersecurity · Jan 5, 2024
← PrevNewer posts

Features

  • Agent
  • Vulnerability Management
  • Continuous Compliance
  • Integrations
  • Streamlined Audit
  • Risk Management
  • Vendor Risk Management
  • User Access Management
  • Trust Management
  • AI Pentests

Frameworks

  • ISO 27001
  • SOC 2
  • HIPAA
  • GDPR
  • PCI DSS
  • HITRUST
  • NIST
  • ISO 42001
  • ISO 9001
  • NIS 2
  • EU AI ACT
  • DORA
  • Cyber Essentials
  • Custom Frameworks

Company

  • About Us
  • Blog
  • Case Studies
  • System Status

Connect

  • LinkedIn ↗
  • YouTube ↗
  • X ↗

Legal

  • Terms of Service
  • Privacy Policy
  • Master Service Agreement
  • Partner Master Service Agreement