Blog

Discover Our Top Featured Articles and More!

The AI Compliance Landscape: A Guide for Organizations to the EU AI Act and Beyond

arrow image

Digital Risk Management: A Comprehensive Guide to Navigating Digital Risks

arrow image

Unlocking the Power of NIST Special Publications: Strengthening Cybersecurity Defenses and Promoting Business Success

arrow image

The History of GRC: A 10-year Reflection Through the Evolution of GRC

arrow image

Compliance Gap Analysis: Fine-Tuning the Compliance Engine

arrow image

Ensure Compliance in Engineering to Help Avoid Errors

arrow image

The Master of All GRC Metrics: Four Frameworks with Performance Metrics

arrow image

Compliance Considerations for Multi Cloud Security

arrow image

Why a Risk-Based Approach to Compliance is Paramount

arrow image

Compliance Data: Leverage Data from GRC

arrow image

When Worlds Collide: How the SEC Cybersecurity Rule and CISA Directive Can Drive Your Cyber Strategy

arrow image

Practical ChatGPT Use Cases in GRC

arrow image

5 Tips on How to Align Sales and Compliance Teams

arrow image

DevOps and Compliance Teams: Working Together for Success

arrow image

What Kind of Evidence Are You Getting From Your Compliance Automation Tool?

arrow image

DevOps and Compliance Automation Tools: The Case for Continuous Compliance Automation

arrow image

Privacy Compliance In 2023

arrow image

Benefits of Data Fabric for Compliance

arrow image

The Impact of Technology on Auditing: Why Auditors Must Embrace Compliance Tools in a Changing World

arrow image

Build Trust: Automate Vendor Risk Management and Compliance

arrow image

Business Intelligence Tools Benefits: How GRC Teams Can Reach Beyond Compliance

arrow image

Work Smarter, Not Harder with Unified Control Sets

arrow image

The Role of Risk Quantification in Communication with Boards

arrow image

Where's my Headcount? Hiring Challenges Unique to GRC Teams

arrow image

The Cobalt + anecdotes Partnership: The Interconnection between Pentesting and Compliance

arrow image

Good Compliance Leader / Bad Compliance Leader

arrow image

Top 5 Security Compliance Trends for 2023

arrow image

Compliance in the Wild West of Crypto Security

arrow image

Meet Compliance with Automation: How The anecdotes Compliance OS Helps Organizations Drive Growth and Maturity

arrow image

How Compliance Automation Can Turn Your Risk Register into a Valuable Business Tool

arrow image

Compliance Teams: How to Use The MITRE ATT&CK Framework to Your Advantage

arrow image

One Size Does Not Fit All: Essential Factors to Consider When Choosing a Compliance Automation Solution

arrow image

8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution

arrow image

Great Scott! Cyber Insurance Requirements (And How Compliance Can Help)

arrow image

Different Professional Backgrounds Are Key to a Successful Compliance Team

arrow image

Zero Trust, 100% Verify: How is Self-Attestation Done in the Compliance World

arrow image

What The White House Memo M-22-18 Means for Federal Software Supply Chain Security Compliance

arrow image

The Nightmare Called Compliance: 3 Halloween Horror Stories

arrow image

Dr. GRC: How You Can Learn to Stop Worrying and Love User Access Reviews (or Maybe Worry Less and Not Hate Them So Much)

arrow image

How to Present Compliance ROI to Leadership: Some Thoughts on the Value of Showing Value

arrow image

How Compliance Leaders Can Use GDPR & Privacy Compliance Frameworks to Grow Their Business

arrow image

The Continuous Risk Management Process: Why It Makes Sense for Your Business

arrow image

Everything You Need to Know About OFDSS

arrow image

How to Mitigate Insider Threat Using Internal Controls

arrow image

Getting Control Owners to Stay Responsible - 3 Do’s and 3 Don'ts

arrow image

How to Talk to Your Board (So They’ll Listen!)

arrow image

Key Components of a Business Continuity Plan: Here’s What Every Compliance Leader Needs to Know

arrow image

Doing More With Less: 6 Ways to Deal with Reduced Manpower in a Tricky Economy

arrow image

5 Ways Compliance Can Earn Security’s Respect

arrow image

ISO 27001 Update: 2022. Here’s Everything You Need to Know

arrow image

Coming Soon to a Bookshelf Near You (....or not): The ABCs of Customized Frameworks

arrow image

The Results are in: A Sneak Peek into anecdotes’ First Annual State of Security Compliance Report

arrow image

Risks are Everywhere - How to Respond to Risk Like a Pro

arrow image

In Uncertain Economic Times, Here are 3 Areas Where Compliance Can Optimize Costs

arrow image

Ensuring Security Compliance Success in Mergers and Acquisitions

arrow image

Building Trust – Why Trust Should be Your Business Strategy

arrow image

A Seat at the Table - Why Compliance Needs to be a Top Priority (if You Want to Grow, That is)

arrow image

PCI-DSS V4.0 is Coming (Eventually, Anyway)- Here's What You Need to Know

arrow image

Getting Leadership's Love; Here’s How to Make it Happen

arrow image

How Important Is Objective Data In Compliance? Oh, It's Only THE Foundation.

arrow image

How Mature is Your Foundation? Why Your Compliance Tech and Tools May Determine Your Future

arrow image

Unified Control Frameworks: Are You Serious? (About Growth, That is)

arrow image

The Power of Data-Driven Risk Management

arrow image

Announcing anecdotes’ $25 M in Series A Funding, to Support and Accelerate Compliance OS

arrow image

Security Compliance Maturity Evolution | Blog by anecdotes

arrow image

Compliance Leader Burnout: Causes and Fixes | anecdotes

arrow image

Compliance as the Key to Security-By-Design | Blog by anecdotes

arrow image

9 Key Questions When Hiring Your First Compliance Leader | anecdotes

arrow image

Lessons from the Kronos Ransomware Attack | Blog by anecdotes

arrow image

Shifting Left on Compliance - 2022 Trends | anecdotes

arrow image

6 Ways Automation Helps Companies Meet SOC 2 | anecdotes

arrow image

5 Takeaways for 2022 from Training Week | Blog by anecdotes

arrow image

Compliance as a Growth Accelerator | Blog by anecdotes

arrow image

Break Free of These Compliance Mindsets | Blog by anecdotes

arrow image

Meet Compliance OS, The Answer to all Your Compliance Needs | anecdotes

arrow image

Why Innovation Isn’t the Only Selling Point Anymore | anecdotes

arrow image

Internal Audits: Five Reasons You Need One | Blog by anecdotes

arrow image

SOC 2: How To Choose The Right Auditor | Blog by anecdotes

arrow image

The Six Skills of a Successful Compliance Leader | anecdotes

arrow image

Intro to HIPAA Compliance + Avoiding Costly Mistakes | anecdotes

arrow image

Unicorn? Soonicorn? Make Sure SOX ITGC is in Your Sights | anecdotes

arrow image

4 (Compliance) Horror Stories

arrow image

The Compliance Guide for Hyper-Growth Companies | anecdotes

arrow image

How To [easily] Automate Sales Administration | anecdotes

arrow image

Scale Your Growth with a Comprehensive Compliance Program | anecdotes

arrow image

Adding a Lego Brick To A Building’s Foundation | anecdotes

arrow image

ISO 27001 vs SOC 2 - Which One is Right For You? | anecdotes

arrow image

Storytelling For Startups: Reach Your Prospects Heart | anecdotes

arrow image

How to Push a Massive Architectural Change | anecdotes

arrow image

A Lesson in (InfoSec Compliance Data) History | Blog by anecdotes

arrow image

Assurance vs Attestation vs Audit

arrow image

How To Easily Lower InfoSec Compliance Audit Costs | anecdotes

arrow image

The Easy Way to Increase Your API Performance | anecdotes

arrow image

GitHub Actions: Query Your Snowflake Warehouse | anecdotes

arrow image

Want to Scale Compliance? Screenshots As Evidence Aren't The Way

arrow image

Compliance As A One-Person-Show

arrow image

How Much Does A SOC 2 Audit Cost? [Not expensive]

arrow image

NgRx Selectors — Blessing in Facade

arrow image

Product Expert Vs Domain Expert - The Great Debate | anecdotes

arrow image

Increasing Compliance to Enhance Security-by-Design | anecdotes

arrow image