![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Whistic Smart Response eliminates the manual steps of security assessment questionnaires
Whistic launched AI-powered Smart Response capability within their dual-sided TPRM platform. With an eye toward entirely eliminating the manual steps of security assessment …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
Whistic introduces third-party risk management platform powered by AI
Whistic unveiled new artificial intelligence (AI) capabilities designed to transform the future of third-party risk management. The first in an ongoing rollout of leading-edge …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
Whistic partners with Google Cloud to provide customers with a transparent security profile
Whistic has formed a collaboration with Google Cloud to provide customers with a transparent security profile, which includes a full Google Cloud Assessment Report. Google …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
TruSight partners with Whistic to provide companies with third-party risk management programs
TruSight partnered with Whistic to enable third parties to inform prospects and customers that they are TruSight validated and streamline customers’ requests to access …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
Whistic collaborates with Cobalt to reduce risks that come from onboarding third-party applications
Whistic collaborates with Cobalt to enable vendors to consolidate all of their security documentation, including standard questionnaires, certifications, audits, and pentests …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD