Menu Icon
< back to main

Compliance

 • 5 min read

New Ebook: Beginner’s Guide to Compliance-Driven Pentesting

Find out more about the role of pentesting in your company’s compliance effort.

Alexander Jones
Alexander Jones
Compliance
How to Achieve SOC 2 Type 2 Compliance
 • 4 min read

How to Achieve SOC 2 Type 2 Compliance

The differences between SOC 2 Type 1 and Type 2, how to obtain Type 2, and how a compliance automation platform like Drata can help you easily achieve these goals.

How e-Commerce Stores Prepare for a PCI-DSS Audit
 • 6 min read

How e-Commerce Stores Prepare for a PCI-DSS Audit

Since many online businesses must follow this specific set of regulations when handling credit card information, it's important to learn about PCI-DSS compliance requirements.

Understanding GDPR Compliance: The Importance of Compliance
 • 4 min read

Understanding GDPR Compliance: The Importance of Compliance

Read about GDPR Compliance and gain insights into why the importance of this user data within this compliance framework.

What a SaaS Provider Should Know about SOC 2 Compliance
 • 6 min read

What a SaaS Provider Should Know about SOC 2 Compliance

SOC 2 auditing is a voluntary way to ensure that they are performing up to industry standards for data security.

How to Become HIPAA Compliant
 • 7 min read

How to Become HIPAA Compliant

Take a closer look at HIPAA compliance by establishing who needs to be compliant and how to achieve it.

What is Cybersecurity Maturity Model Certification (CMMC)?
 • 7 min read

What is Cybersecurity Maturity Model Certification (CMMC)?

Read about the Cybersecurity Maturity Model Certification (CMMC) with this overview explaining the basics and how pentesting fits into this certification.

How to Define & Prepare Your PHI for a HIPAA Pentest
 • 5 min read

How to Define & Prepare Your PHI for a HIPAA Pentest

What is HIPAA Compliance?

Never miss a story

Stay updated about Cobalt news as it happens