<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>compliance Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/compliance/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 12 Feb 2026 01:15:39 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>compliance Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>White House Rescinds SBOM Mandates: A Strategic Shift in Software Supply Chain Security</title>
		<link>https://www.vertexcybersecurity.com.au/white-house-rescinds-sbom-mandates-a-strategic-shift-in-software-supply-chain-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=white-house-rescinds-sbom-mandates-a-strategic-shift-in-software-supply-chain-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:18:09 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[HBOM]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Software Supply Chain]]></category>
		<category><![CDATA[White House]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10265</guid>

					<description><![CDATA[The White House has rescinded mandatory SBOM requirements in favour of a risk-based approach. Learn what this shift means for software supply chain security.]]></description>
		
		
		
			</item>
		<item>
		<title>Should I use Vanta at my business?</title>
		<link>https://www.vertexcybersecurity.com.au/should-i-use-vanta-at-my-business/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=should-i-use-vanta-at-my-business</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 15:24:26 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Security Budget]]></category>
		<category><![CDATA[Small Business Security]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[Startup Cyber Security]]></category>
		<category><![CDATA[Vanta]]></category>
		<category><![CDATA[Vertex ALKE]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10236</guid>

					<description><![CDATA[Is Vanta the right choice for your business? We analyse the costs of compliance platforms versus actual security implementation and why smaller organisations should prioritise their budget differently.]]></description>
		
		
		
			</item>
		<item>
		<title>Read This Before Purchasing Scrut Automation</title>
		<link>https://www.vertexcybersecurity.com.au/read-this-before-purchasing-scrut-automation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=read-this-before-purchasing-scrut-automation</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:52:53 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Business Strategy]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Scrut Automation]]></category>
		<category><![CDATA[SOC 2]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9989</guid>

					<description><![CDATA[Considering Scrut Automation? Read this review first. We analyse the limits of "smart GRC," the reality of unified risk platforms, and why a spreadsheet might be a better start.]]></description>
		
		
		
			</item>
		<item>
		<title>Read This Before You Buy Drata</title>
		<link>https://www.vertexcybersecurity.com.au/read-this-before-you-buy-drata/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=read-this-before-you-buy-drata</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:48:45 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[SOC2]]></category>
		<category><![CDATA[Business Strategy]]></category>
		<category><![CDATA[Compliance Automation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Drata]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[SOC 2]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9987</guid>

					<description><![CDATA[Thinking of buying Drata? Read this review first. We analyse the limits of automated compliance, the "Trust Center" myth, and why you should compare it to a spreadsheet.]]></description>
		
		
		
			</item>
		<item>
		<title>Read This Before You Buy Sprinto</title>
		<link>https://www.vertexcybersecurity.com.au/read-this-before-you-buy-sprinto/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=read-this-before-you-buy-sprinto</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:45:04 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Compliance Platforms]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[Sprinto]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9985</guid>

					<description><![CDATA[Thinking of buying Sprinto? Read this first. We analyse the risks of "sprinting" through compliance, the limitations of "autopilot," and why you should compare it to a spreadsheet first.]]></description>
		
		
		
			</item>
		<item>
		<title>Accelerate Your ISO 27001 Implementation</title>
		<link>https://www.vertexcybersecurity.com.au/accelerate-your-iso-27001-implementation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=accelerate-your-iso-27001-implementation</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 11:47:28 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Business Risk]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO Standards]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9344</guid>

					<description><![CDATA[This blog discusses some achievable solutions to help accelerate your ISO 27001 implementation. Why ISO 27001 Matters Data breaches are on the rise. Customers expect you to keep their data safe. ISO 27001 is the gold standard for information security. It helps businesses of all sizes manage risk and build trust. But getting certified isn’t [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>ISO 27001 Certification Timeline</title>
		<link>https://www.vertexcybersecurity.com.au/iso-27001-certification-timeline/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso-27001-certification-timeline</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Tue, 26 Nov 2024 02:14:32 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27001 Certification]]></category>
		<category><![CDATA[ISO Standards]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9031</guid>

					<description><![CDATA[Obtaining ISO 27001 certification is a major step for organisations prioritising information security. However, the ISO 27001 certification timeline can vary significantly depending on several factors. In this blog, we’ll explore how long the process typically takes, the key steps involved, and how organisations can prepare effectively. What Is ISO 27001 Certification? ISO 27001 is [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>ISO 27001 Implementation</title>
		<link>https://www.vertexcybersecurity.com.au/iso-27001-implementation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso-27001-implementation</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 06 Nov 2024 07:35:37 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Cybersecurity Compliance]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8950</guid>

					<description><![CDATA[If you’re looking to start ISO 27001 implementation, here’s a practical guide to get you there step-by-step. In today&#8217;s digital landscape, protecting information is more crucial than ever. ISO 27001 is an internationally recognised standard for information security management. By implementing it, organisations can ensure their data remains secure, reducing the risk of cyber threats [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>ISO 27001 Case Studies and Success Stories</title>
		<link>https://www.vertexcybersecurity.com.au/iso-27001-case-studies-and-success-stories/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso-27001-case-studies-and-success-stories</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 09:30:49 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Certification]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8837</guid>

					<description><![CDATA[Introduction ISO 27001, the global standard for information security management, helps organisations protect their data. But how does it work in real-life scenarios? This blog explores real-world case studies, showing how companies have applied ISO 27001 to strengthen security, reduce risks, and enhance customer trust. Let’s dive into some success stories. What is ISO 27001? [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Common Misconceptions About ISO 27001</title>
		<link>https://www.vertexcybersecurity.com.au/common-misconceptions-about-iso-27001/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=common-misconceptions-about-iso-27001</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 20 Sep 2024 08:50:12 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Certification]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8713</guid>

					<description><![CDATA[Introduction ISO 27001 is a widely recognised standard for information security management. Despite its importance, many organisations still misunderstand its purpose and benefits. These misconceptions can lead to poor decisions, inadequate security measures, or costly delays in certification. In this blog, we&#8217;ll debunk some of the most common misconceptions about ISO 27001 and highlight the [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
