supernav-iconJoin Us at AWS re:Invent 2024

Contact Sales

  • Sign In
  • Get Started
HomeBlog

Trusted, the Drata Blog

Your hub for the latest security and compliance resources, updates, and expert insights. A simplified journey to compliance starts here.

Featured
Will the EU-s sweeping regulations List

Will the EU's Sweeping Regulations Make Big Tech Platforms Safer?

We examined news reports and economic analyses to determine what the impact of the European Union's tech regulations has been on consumers.

Read More
Most Recent
How to Build an Agile Risk Management Program List

Building an Agile Risk Management Program: A Step-by-Step Guide

October Product Roundup

October Product Roundup

Cyberattacks are on the rise List

Cyberattacks are on the Rise, and They're Costing Us Billions of Dollars

Compliance

View All
ISO 27001 checklist hero

ISO 27001 Checklist: 8 Easy Steps to Get Started

CCM 101 - Header

CCM 101: Introducing the Cloud Control Matrix

Illustraction depicting a GDPR compliance checklist

GDPR Compliance Checklist: How to Become Compliant

Cost of Not Being Compliant with Frameworks

The Cost of Non-Compliance

Risk Management

Drataverse Digital Risk and Reward Header
Risk Assessment Icon

Risk Management

Control Meets Confidence at Drataverse Digital: Risk and Reward

6 Types of Risk Assessment Methodologies + How to Choose

6 Types of Risk Assessment Methodologies + How to Choose

third-party-risk-management-hero

Beginner’s Guide to Third-Party Risk Management

Blog-Featured-Images-23

Penetration Testing vs. Vulnerability Scanning: What’s the Difference?

Security

Demand for Cybersecurity Talent Hero

Demand for Cybersecurity Analysts Is Growing Twice as Fast as the Workforce

Illustration of a scale showing different levels of risk and a clipboard.

Risk Register: How to Build One + Examples

CE Checklist

Cyber Essentials Checklist

Penetration testing hero

Penetration Testing: Why It’s Important + Common Types

News and Events

G2 Fall 2024 Blog Feature 2472 × 1000

Drata Maintains Strong Momentum in G2 Fall 2024 Reports

DRATA CODE OF ETHICS FEATURE

Announcing Our Code of Ethics Alongside Trusted Audit Firms

Image - oak9 acquisition

Drata’s Acquisition of oak9 Ushers in New Era of Compliance as Code

Gartner DCCA Market Guide feature image

Drata Recognized in the 2024 Gartner® Market Guide for DevOps Continuous Compliance Automation Tools Report

Product Updates

ICYMI Drataverse Digital Header

Drata Launches Control Readiness Approval

ICYMI Drataverse Digital Header

Streamlining Security and Compliance with Drata's New Role-Based Access Control

ICYMI Drataverse Digital Header

Drata's Evidence Library: Revolutionizing Evidence Collection and Management

ICYMI Drataverse Digital Header

Drata's User Access Review: Empowering GRC Teams with Streamlined Efficiency

Looking For More?

Check Out the Latest GRC Resources

User access review hero image

BLOG

User Access Reviews: A Step-by-Step Guide + Checklist

third-party-risk-management-hero

BLOG

Beginner’s Guide to Third-Party Risk Management

soc-2-hero

BLOG

What Is a SOC 2 Bridge Letter? [+ Template]

Automate Your Journey

Drata's platform experience is designed by security and compliance experts so you don't have to be one.

Connect

Easily integrate your tech stack with Drata.

Configure

Pre-map auditor validated controls.

Comply

Begin automating evidence collection.

Put Security & Compliance on Autopilot®

Close more sales and build trust faster while eliminating hundreds of hours of manual work to maintain compliance.

Get Started