Blog

Discover Our Top Featured Articles and More!

Benefits of Data Fabric for Compliance

arrow image

The Third Line of Defense: Auditors Must Embrace Compliance Technology in a Changing World

arrow image

Building Trust Through VRM and Compliance Automation

arrow image

How Business Intelligence Tools Can Help GRC Teams Reach Beyond Compliance

arrow image

The Role of Risk Quantification in Communication with Boards

arrow image

Where's my Headcount? Hiring Pitfalls Unique to GRC Teams

arrow image

The Cobalt + anecdotes Partnership: The Interconnection between Pentesting and Compliance

arrow image

Good Compliance Leader / Bad Compliance Leader

arrow image

Security Compliance Trends for 2023

arrow image

Security Compliance in the Wild West of Crypto

arrow image

How Compliance Automation Can Turn Your Risk Register into a Valuable Business Tool

arrow image

Compliance Teams: How to Use The MITRE ATT&CK Framework to Your Advantage

arrow image

One Size Does Not Fit All: Essential Factors to Consider When Choosing a Compliance Automation Solution

arrow image

8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution

arrow image

Great Scott! What You Need to Know About Cyber Insurance (And How Compliance Can Help)

arrow image

Different Professional Backgrounds Are Key to a Successful Compliance Team

arrow image

Zero Trust, 100% Verify: How is Self-Attestation Done in the Compliance World

arrow image

The Nightmare Called Compliance: 3 Halloween Horror Stories

arrow image

Dr. GRC: How You Can Learn to Stop Worrying and Love User Access Reviews (or Maybe Worry Less and Not Hate Them So Much)

arrow image

How to Present Compliance ROI to Leadership: Some Thoughts on the Value of Showing Value

arrow image

Continuous Risk Management: Why It Makes Sense for Your Business

arrow image

How to Mitigate Insider Threat Using Internal Controls

arrow image

Getting Control Owners to Stay Responsible - 3 Do’s and 3 Don'ts

arrow image

How to Talk to Your Board (So They’ll Listen!)

arrow image

Building a Business Continuity Plan? Here’s What Every Compliance Leader Needs to Know

arrow image

Doing More With Less: 6 Ways to Deal with Reduced Manpower in a Tricky Economy

arrow image

5 Ways Compliance Can Earn Security’s Respect

arrow image

Risks are Everywhere - How to Respond and Manage Them

arrow image

In Uncertain Economic Times, Here are 3 Areas Where Compliance Can Optimize Costs

arrow image

Building Trust – Why Trust Should be Your Business Strategy

arrow image

Getting Leadership's Love; Here’s How to Make it Happen

arrow image

How Important Is Objective Data In Compliance? Oh, It's Only THE Foundation.

arrow image

How Mature is Your Foundation? Why Your Compliance Tech and Tools May Determine Your Future

arrow image

Unified Control Frameworks: Are You Serious? (About Growth, That is)

arrow image

The Power of Data-Driven Risk Management

arrow image

Announcing anecdotes’ $25 M in Series A Funding, to Support and Accelerate Compliance OS

arrow image

Security Compliance Maturity Evolution | Blog by anecdotes

arrow image

Compliance Leader Burnout: Causes and Fixes | anecdotes

arrow image

Compliance as the Key to Security-By-Design | Blog by anecdotes

arrow image

9 Key Questions When Hiring Your First Compliance Leader | anecdotes

arrow image

Lessons from the Kronos Ransomware Attack | Blog by anecdotes

arrow image

Shifting Left on Compliance - 2022 Trends | anecdotes

arrow image

6 Ways Automation Helps Companies Meet SOC 2 | anecdotes

arrow image

Compliance as a Growth Accelerator | Blog by anecdotes

arrow image

Break Free of These Compliance Mindsets | Blog by anecdotes

arrow image

Meet Compliance OS, The Answer to all Your Compliance Needs | anecdotes

arrow image

Internal Audits: Five Reasons You Need One | Blog by anecdotes

arrow image

SOC 2: How To Choose The Right Auditor | Blog by anecdotes

arrow image

The Six Skills of a Successful Compliance Leader | anecdotes

arrow image

Intro to HIPAA Compliance + Avoiding Costly Mistakes | anecdotes

arrow image

Unicorn? Soonicorn? Make Sure SOX ITGC is in Your Sights | anecdotes

arrow image

4 (Compliance) Horror Stories

arrow image

The Compliance Guide for Hyper-Growth Companies | anecdotes

arrow image

Scale Your Growth with a Comprehensive Compliance Program | anecdotes

arrow image

A Lesson in (InfoSec Compliance Data) History | Blog by anecdotes

arrow image

How To Easily Lower InfoSec Compliance Audit Costs | anecdotes

arrow image

Want to Scale Compliance? Screenshots Aren't The Way | anecdotes

arrow image

Compliance As A One-Person-Show

arrow image

Increasing Compliance to Enhance Security-by-Design | anecdotes

arrow image

4 Benefits Of Shifting The Compliance Playing Field | anecdotes

arrow image

Cross Audit Evidence Sharing: Compliance Language | anecdotes

arrow image

SOC 2 is a Pain in the PAST

arrow image

Why You Need Automation In Your Audit Preparation | anecdotes

arrow image

Data You Trust, Compliance You Can Trust | Blog by anecdotes

arrow image

Life Is A Checklist of Checklists | Blog by anecdotes

arrow image