
Whistic Smart Response eliminates the manual steps of security assessment questionnaires
Whistic launched AI-powered Smart Response capability within their dual-sided TPRM platform. With an eye toward entirely eliminating the manual steps of security assessment …

Whistic introduces third-party risk management platform powered by AI
Whistic unveiled new artificial intelligence (AI) capabilities designed to transform the future of third-party risk management. The first in an ongoing rollout of leading-edge …

Whistic partners with Google Cloud to provide customers with a transparent security profile
Whistic has formed a collaboration with Google Cloud to provide customers with a transparent security profile, which includes a full Google Cloud Assessment Report. Google …

TruSight partners with Whistic to provide companies with third-party risk management programs
TruSight partnered with Whistic to enable third parties to inform prospects and customers that they are TruSight validated and streamline customers’ requests to access …

Whistic collaborates with Cobalt to reduce risks that come from onboarding third-party applications
Whistic collaborates with Cobalt to enable vendors to consolidate all of their security documentation, including standard questionnaires, certifications, audits, and pentests …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility