Blog

Insights and expertise from Thoropass

Featured

Introducing NIST CSF, CMMC Level 1 and Cyber Essentials

Strengthen your baseline security posture and align with the latest industry guidance. Our platform and experts are here to help you move forward with clarity and speed.

Learn More

Latest posts

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

News and Events /

Talking about DiversITy: Shattering the SaaS Ceiling

Yesterday, our Founder and COO, Eva Pittas, joined a panel held by Electric.ai on women in IT. With just 26% of computing-related jobs held by female-identifiers, the panel discussed long-standing issues with inclusion in the space. At Laika, Eva works diligently to foster a culture of inclusion. With decades of executive-level experience, she understands that diverse companies perform better, hire better talent, have more engaged employees, and retain workers better than companies that do not focus on diversity and inclusion. This core value has been baked into Laika’s culture from day 1.

Read Article

Compliance /

How SOC 2 compliance works: Control implementation

In our second installment covering Thoropass’s SOC 2 compliance, we’ll be focusing on the control implementation process. This is the “meat and potatoes” of your compliance posture.

Read Article

Compliance /

SOC 2 compliance: The what, why, and how

SOC stands for System and Organization Control and is an objective, third-party system that tells customers that they can trust your company to handle their information with the utmost care. This is the compliance audit most commonly sought by startups, particularly SaaS, as it’s relevant for any business that uses the cloud to store data.

Read Article

News and Events /

SOC 2 Automation for dealcloser: Saving Time Answering Questionnaires

dealcloser revolutionizes the way law firms and their customers work together through the deal process by providing lawyers with a platform that significantly decreases the time spent on excessive paperwork and administrative tasks.

Read Article

Compliance /

Reducing Cyber Risk from the Start: Everything to Know About ISO 27001

Most businesses have a variety of ways to secure information–from multi-factor authentication policies to keycard-only access in an office. When you’re starting out, it can be easy to overlook security policies and practices in favor of “moving fast and breaking things.” But if you want to grow your business long-term, your prospects and customers need to know that their data is secure.

Read Article
Curated by experts

We provide the compliance expertise, so you don’t have to

At Thoropass, we’re more than a readiness solution. Our team of experts are equipped with insight and hands-on experience to provide you with industry-leading perspective and guidance.

Meet the Experts

Stay connected

Subscribe to receive new blog articles and updates from Thoropass in your inbox.

Thank you for subscribing! Be on the lookout for confirmation in your inbox!
Oops! Something went wrong while submitting the form.

Want to join our team?

Help Thoropass ensure that compliance never gets in the way of innovation.

View open roles

Have any feedback?

Drop us a line and we’ll be in touch.

Contact us