Blog

Insights and expertise from Thoropass

Latest posts

Scam Hunters episode 9: The Hunter

In the latest Scam Hunters episode, aptly titled The Hunter, the lines between friend and foe blur as trust unravels in real-time. What starts as a seemingly straightforward partnership…

Compliance in EMEA: A strategic blueprint for navigating essential guidelines and regulations

As AI continuing to develop at a rapid pace and legal frameworks try to keep pace, companies in the EMEA region (Europe, Middle East, and Africa) are squeezed between…

Compliance software solutions: Key features to consider in 2024

Compliance management software equips organizations with the capability to meet both governmental guidelines and professional standards, thereby fostering safer work environments and diminishing ecological footprints.  These tools serve as…

NIST CSF 2.0: Essential updates for enhanced cybersecurity

Released in February 2024, the NIST Cybersecurity Framework (CSF) 2.0,  provides a flexible framework to help organizations manage cybersecurity risks. It is suitable for a wide range of organizations,…

Four new frameworks from Thoropass: HIPAA, HITRUST, and ISO changes to streamline your compliance 

Four new frameworks from Thoropass: HIPAA, HITRUST, and ISO changes to streamline your compliance 

Compliance in EMEA: A strategic blueprint for navigating essential guidelines and regulations

As AI continuing to develop at a rapid pace and legal frameworks try to keep pace, companies in the EMEA region (Europe, Middle East, and Africa) are squeezed between…

Compliance software solutions: Key features to consider in 2024

Compliance management software equips organizations with the capability to meet both governmental guidelines and professional standards, thereby fostering safer work environments and diminishing ecological footprints.  These tools serve as…

NIST CSF 2.0: Essential updates for enhanced cybersecurity

Released in February 2024, the NIST Cybersecurity Framework (CSF) 2.0,  provides a flexible framework to help organizations manage cybersecurity risks. It is suitable for a wide range of organizations,…

Your ultimate guide to IT risk assessment

A risk assessment (sometimes referred to as an IT risk assessment) is the process of identifying, evaluating, and mitigating risks associated with an organization’s IT systems and environment. This…

SOC 2 assessment: A comprehensive guide to attestation

SOC 2 is an audit report that provides assurance on the efficacy of information security protocols within service organizations. Its fundamental purpose is to forge trust among service providers…

Four new frameworks from Thoropass: HIPAA, HITRUST, and ISO changes to streamline your compliance 

Four new frameworks from Thoropass: HIPAA, HITRUST, and ISO changes to streamline your compliance 

Introducing support for 23 NYCRR Part 500:  Enhance cyber governance, mitigate risks, and protect your business from cyber threats

Thoropass now supports 23 NYCRR Part 500 cybersecurity regulation! Thoropass’ end-to-end compliance and audit solution can now guide you through the entire process. With everything in one place, achieving…

Introducing: The Thoropass Integration Partner Program

Thoropass began with a clear vision: never let compliance be a blocker to innovation. That means removing unnecessary work, and automating tedious processes. Integrations have always been at the…

Product announcements unveiled at #ThoropassConnect: New Access Reviews & more!

Companies today are juggling an average of over 130 SaaS applications—nearly double the number from 2020. Managing who has access to what tools is no longer a simple administrative…

What to look for from your compliance management software in 2024

In 2024, the importance of cybersecurity, risk management, and compliance has never been more critical. As new regulations (e.g., EU AI Act) emerge and compliance regulations (PCI DSS, GDPR,…

Scam Hunters episode 9: The Hunter

In the latest Scam Hunters episode, aptly titled The Hunter, the lines between friend and foe blur as trust unravels in real-time. What starts as a seemingly straightforward partnership…

Meet Thoropass’ Head of EMEA: An interview with Andrew Lecocq

As Thoropass continues to grow and expand its footprint in Europe & beyond (EMEA), the importance of visionary leadership becomes even more critical. We’re thrilled to introduce Andrew Lecocq,…

Scam Hunters episode 8: Daughter

Episode 8 of Scam Hunters takes us on a wild ride you won’t want to miss! In this week’s episode, investigative journalist Heidi Waldroup (played by Erin Moriarty) finds herself…

Thoropass x HITRUST: Adapting to emerging risk landscapes with AI assurance [Video]

As the adoption of artificial intelligence accelerates, organizations must learn to rapidly to the ever-evolving risk landscape. The Thoropass team recently presented at HITRUST Collaborate speaking on this very…

Scam Hunters episode 7: The Stakehold

On the latest episode of Scam Hunters, we’re diving into a mystery that will make you think twice about who you let into your business. Our fearless investigators, Heidi…

The HITRUST AI security assessment and certification: a trustworthy approach for managing AI risks

AI is revolutionizing industries. It offers immense potential for businesses. However, its complexity introduces new risks that traditional cybersecurity frameworks were not built to manage. From data poisoning to…

Global compliance in HR and payroll 

As remote work and global business become more and more common, your company may be considering adding employees in another country, or maybe you already have an international team. …

Safeguarding Healthcare systems in the digital age: Navigating threats and new regulations

Healthcare has undergone a digital transformation over the past decade—electronic health record (EHR) adoption is at an all-time high, telehealth has become a key channel for patient care, and…

AWS Foundation Technical Review (FTR): Reducing risks and validating capabilities for growing companies. 

Any SaaS business should be putting high importance on optimizing and securing its AWS environments and making them operationally efficient, all while using best practices. This helps safeguard your…

Simplifying FinTech compliance auditing and implementation with DuploCloud

Financial Technology (FinTech) drives repeatable, secure processes that promote fast, safe, and user-friendly transactions. It is one of the most complex and highly volatile regulatory landscapes with significant stakes…
  • 1
  • 2