CHANGELOG

TrustCloud
(December 19, 2023)
Bug Fix

The "Connect to Azure DevOps" button was directed to Integration main page

Clicking on the “Connect to Azure DevOps” button now tests the connection and passes or fails accordingly.

LEARN AND ENGAGE

Connect with the TrustCommunity

Explore the TrustCommunity forums, ask questions, and learn from your peers.

Topics: 2

Replies: 0

Interact with other security, privacy and GRC professionals in our forums

THE MORE YOU KNOW

Want to learn more about GRC?

Explore our GRC launchpad to gain expertise on numerous compliance standards and topics

Compliance 101

Enforcing compliance helps protect your company from regulatory rule violations.

All about HIPAA

Safeguard sensitive protected health information (PHI) from being disclosed without the patient’s consent or knowledge.

What is SOC 2?

SOC 2 demonstrates that your company has adequate controls in place to protect customer data in your environment.

Intro to ISO 27001

A ISO 27001 certification demonstrates that your company has an adequate information security system in place.

View the entire list of compliance articles in GRC Launchpad

STAY UP TO DATE

What’s new in FlightSchool?

We've curated the latest FlightSchool content and articles to help you stay up to date

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a

Vulnerability management policy: The crucial role in enhancing cybersecurity defence

Introduction to vulnerability management policy In today’s rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments. The increasing sophistication of cyber threats requires

Significance of implementing robust risk management policies as foundations of business stability

Risk management policies are a systematic process of identifying, assessing, and mitigating risks to minimize their impact on business objectives.  In today’s fast-paced business environment, risk management is no longer an optional part of a
OR