Learn more about Whistic’s response to Apache Log4j and what we’re doing to help our customers with this vulnerability. Read more

Resource Library

Gain insights and learn from the brightest minds as you continue your journey from reactive to proactive vendor security.

State of Transparency and Trust

Why public security information increases trust and influences purchase decisions

Read More


Tips for Decreasing the Likelihood of a Ransomware Attack

Over the Fourth of July weekend, Kaseya, a software vendor that provides endpoint management and.... Read More

Understanding the SolarWinds Orion Breach

One of the biggest takeaways from the recent SolarWinds breach is that no company or organization.... Read More

3 Ways to Improve Your Vendor Security Program in 2021

We are almost to the end of another year. And what a year it was: 2020 resulted in more changes,.... Read More

#1 Tip for Building Your Vendor Security Process

The last few months have been eye-opening for many, and it has been no different for those in the.... Read More

Updated VSA CORE Questionnaire Now Available on Whistic

The Vendor Security Alliance, long one of the forerunners in vendor risk assessments and security.... Read More

BYOQ — All of the Security Questionnaires Whistic Supports

For many InfoSec teams, the end of a year means planning for new updates, thinking about new.... Read More

Whistic Help Center

Learn More