Blog

Discover Our Top Featured Articles and More!

The AI Compliance Landscape: A Guide for Organizations to the EU AI Act and Beyond

arrow image

Digital Risk Management: A Comprehensive Guide to Navigating Digital Risks

arrow image

Unlocking the Power of NIST Special Publications: Strengthening Cybersecurity Defenses and Promoting Business Success

arrow image

The History of GRC: A 10-year Reflection Through the Evolution of GRC

arrow image

Compliance Gap Analysis: Fine-Tuning the Compliance Engine

arrow image

Ensure Compliance in Engineering to Help Avoid Errors

arrow image

The Master of All GRC Metrics: Four Frameworks with Performance Metrics

arrow image

Compliance Considerations for Multi Cloud Security

arrow image

Why a Risk-Based Approach to Compliance is Paramount

arrow image

Compliance Data: Leverage Data from GRC

arrow image

When Worlds Collide: How the SEC Cybersecurity Rule and CISA Directive Can Drive Your Cyber Strategy

arrow image

Practical ChatGPT Use Cases in GRC

arrow image

5 Tips on How to Align Sales and Compliance Teams

arrow image

DevOps and Compliance Teams: Working Together for Success

arrow image

What Kind of Evidence Are You Getting From Your Compliance Automation Tool?

arrow image

Privacy Compliance In 2023

arrow image

Benefits of Data Fabric for Compliance

arrow image

The Impact of Technology on Auditing: Why Auditors Must Embrace Compliance Tools in a Changing World

arrow image

Build Trust: Automate Vendor Risk Management and Compliance

arrow image

Business Intelligence Tools Benefits: How GRC Teams Can Reach Beyond Compliance

arrow image

The Role of Risk Quantification in Communication with Boards

arrow image

Where's my Headcount? Hiring Challenges Unique to GRC Teams

arrow image

The Cobalt + anecdotes Partnership: The Interconnection between Pentesting and Compliance

arrow image

Good Compliance Leader / Bad Compliance Leader

arrow image

Top 5 Security Compliance Trends for 2023

arrow image

Compliance in the Wild West of Crypto Security

arrow image

How Compliance Automation Can Turn Your Risk Register into a Valuable Business Tool

arrow image

Compliance Teams: How to Use The MITRE ATT&CK Framework to Your Advantage

arrow image

One Size Does Not Fit All: Essential Factors to Consider When Choosing a Compliance Automation Solution

arrow image

8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution

arrow image

Great Scott! Cyber Insurance Requirements (And How Compliance Can Help)

arrow image

Different Professional Backgrounds Are Key to a Successful Compliance Team

arrow image

Zero Trust, 100% Verify: How is Self-Attestation Done in the Compliance World

arrow image

The Nightmare Called Compliance: 3 Halloween Horror Stories

arrow image

Dr. GRC: How You Can Learn to Stop Worrying and Love User Access Reviews (or Maybe Worry Less and Not Hate Them So Much)

arrow image

How to Present Compliance ROI to Leadership: Some Thoughts on the Value of Showing Value

arrow image

The Continuous Risk Management Process: Why It Makes Sense for Your Business

arrow image

How to Mitigate Insider Threat Using Internal Controls

arrow image

Getting Control Owners to Stay Responsible - 3 Do’s and 3 Don'ts

arrow image

How to Talk to Your Board (So They’ll Listen!)

arrow image

Key Components of a Business Continuity Plan: Here’s What Every Compliance Leader Needs to Know

arrow image

Doing More With Less: 6 Ways to Deal with Reduced Manpower in a Tricky Economy

arrow image

5 Ways Compliance Can Earn Security’s Respect

arrow image

Risks are Everywhere - How to Respond to Risk Like a Pro

arrow image

In Uncertain Economic Times, Here are 3 Areas Where Compliance Can Optimize Costs

arrow image

Building Trust – Why Trust Should be Your Business Strategy

arrow image

Getting Leadership's Love; Here’s How to Make it Happen

arrow image

How Important Is Objective Data In Compliance? Oh, It's Only THE Foundation.

arrow image

How Mature is Your Foundation? Why Your Compliance Tech and Tools May Determine Your Future

arrow image

Unified Control Frameworks: Are You Serious? (About Growth, That is)

arrow image

The Power of Data-Driven Risk Management

arrow image

Announcing anecdotes’ $25 M in Series A Funding, to Support and Accelerate Compliance OS

arrow image

Security Compliance Maturity Evolution | Blog by anecdotes

arrow image

Compliance Leader Burnout: Causes and Fixes | anecdotes

arrow image

Compliance as the Key to Security-By-Design | Blog by anecdotes

arrow image

9 Key Questions When Hiring Your First Compliance Leader | anecdotes

arrow image

Lessons from the Kronos Ransomware Attack | Blog by anecdotes

arrow image

Shifting Left on Compliance - 2022 Trends | anecdotes

arrow image

6 Ways Automation Helps Companies Meet SOC 2 | anecdotes

arrow image

Compliance as a Growth Accelerator | Blog by anecdotes

arrow image

Break Free of These Compliance Mindsets | Blog by anecdotes

arrow image

Meet Compliance OS, The Answer to all Your Compliance Needs | anecdotes

arrow image

Internal Audits: Five Reasons You Need One | Blog by anecdotes

arrow image

SOC 2: How To Choose The Right Auditor | Blog by anecdotes

arrow image

The Six Skills of a Successful Compliance Leader | anecdotes

arrow image

Intro to HIPAA Compliance + Avoiding Costly Mistakes | anecdotes

arrow image

Unicorn? Soonicorn? Make Sure SOX ITGC is in Your Sights | anecdotes

arrow image

4 (Compliance) Horror Stories

arrow image

The Compliance Guide for Hyper-Growth Companies | anecdotes

arrow image

Scale Your Growth with a Comprehensive Compliance Program | anecdotes

arrow image

A Lesson in (InfoSec Compliance Data) History | Blog by anecdotes

arrow image

How To Easily Lower InfoSec Compliance Audit Costs | anecdotes

arrow image

Want to Scale Compliance? Screenshots As Evidence Aren't The Way

arrow image

Compliance As A One-Person-Show

arrow image

Increasing Compliance to Enhance Security-by-Design | anecdotes

arrow image

4 Benefits Of Shifting The Compliance Playing Field | anecdotes

arrow image

Cross Audit Evidence Sharing: Compliance Language | anecdotes

arrow image

SOC 2 is a Pain in the PAST

arrow image

Why You Need Automation In Your Audit Preparation | anecdotes

arrow image

Data You Trust, Compliance You Can Trust | Blog by anecdotes

arrow image

Life Is A Checklist of Checklists

arrow image