Knowledge Base

Articles, whitepapers and insights into IT audit, information security, compliance and risk management.

Compliance7 min read

ISO 42001 certification: 7 lessons from the field

More organizations pursue ISO 42001 certification for AI governance. But the practice is tougher than the theory. These are the seven things we encounter.

By Kees van der Vlies
Read more
IT-audit5 min read

SOC 2 report explained: everything you need to know

SOC 2 is an essential audit report for service organizations. Learn what a SOC 2 report entails and why it matters for your business.

By Kees van der Vlies
Read more
IT-audit6 min read

ISAE 3402 vs SOC 2: which audit do you need?

ISAE 3402 and SOC 2 are both assurance standards for service organizations. But they differ in scope, audience and application. Here is how to choose.

By Kees van der Vlies
Read more
Security8 min read

ISO 27001 certification: a practical roadmap

Planning your ISO 27001 certification? This step-by-step roadmap covers scoping, risk assessment, implementation and the certification audit itself.

By Kees van der Vlies
Read more
IT-audit6 min read

Continuous auditing: real-time assurance for modern organizations

Traditional audits look back. Continuous auditing looks forward. Learn how real-time monitoring and automated testing are transforming IT audit.

By Kees van der Vlies
Read more
IT-audit5 min read

SOC 2 Type 1 vs Type 2: what is the difference?

SOC 2 Type 1 and Type 2 reports serve different purposes. Understand the key differences to choose the right report for your organization.

By Kees van der Vlies
Read more
IT-audit6 min read

What is ISAE 3402? A complete guide for service organizations

ISAE 3402 is the international standard for assurance reports on controls at service organizations. This guide explains what it means for your business.

By Kees van der Vlies
Read more
Security5 min read

Pentest vs vulnerability scan: what is the difference?

Both pentests and vulnerability scans identify security weaknesses. But they differ fundamentally in approach, depth and value. Here is how to choose.

By Kees van der Vlies
Read more

Stay informed

Get our latest articles and insights on IT audit, compliance and information security.