Building a Strong Audit Management Process

Building a Strong Audit Management Process

| | audits, Blog Posts
Companies need to collaborate with their audit firms, which means they must anticipate the audit firm’s needs. The better you do at that task, the easier (read: less expensive) your audit will ...

Understanding Audit Readiness Assessments: Their Importance and Whether You Need Them

| | audits, Blog Posts, Seg1
As a compliance management software company, we at Hyperproof believe it’s important to hold ourselves to the highest standards in all that we do. Even before we’ve made our product publicly available, ...
Agile Auditing: What You Need to Know

Understanding Agile Auditing: Essential Insights

| | audits, Blog Posts
For years, compliance audits have been conducted the same way: create an audit plan, complete the audit plan, and review the audit results. But, in recent years, this traditional method of auditing ...
SOC 2 Compliance: What You Need to Know and Need to Do

SOC 2 Compliance: What You Need to Know and Need to Do

Businesses today are storing increasing amounts of data on customers, and it’s not just users who are concerned about the safety of their data. One of the compliance standards that has emerged ...
Curvance: Invariants unleashed

Curvance: Invariants unleashed

By Nat Chin Welcome to our deep dive into the world of invariant development with Curvance. We’ve been building invariants as part of regular code review assessments for more than 6 years ...
Compliance Audits: What to Know to Pass Audits

Compliance Audits: What to Know to Pass Audits

It’s an exciting time for your growing company. Your product’s launched, a small sales team has been hired, you’re starting to build a predictable pipeline of prospects, and your early customers are ...
What is SOC 2 Compliance Audit?

What is SOC 2 Compliance Audit?

Our digital world is based on connectivity, but with that comes great responsibility. Businesses manage vast amounts of client information. Ensuring the protection of this information is not an easy task, especially ...
Roles of the internal compliance audit process

How to Conduct an Internal Audit: A Comprehensive Guide

In today’s digital age, external compliance audits and third-party attestations (e.g., SOC 2) have become increasingly crucial in B2B purchase decisions. Not only do they provide an objective third-party verification of a ...
Diagram of an Ockam Identity showing an example of a signed change history with three blocks

Cryptographic design review of Ockam

By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de Pol In October 2023, Ockam hired Trail of Bits to review the design of its product, a set of protocols that ...

Internet freedom with the Open Technology Fund

By Spencer Michaels, William Woodruff, Jeff Braswell, and Cliff Smith Trail of Bits cares about internet freedom, and one of our most valued partners in pursuit of that goal is the Open ...