Sarika Bhatta

Blog

Thoughts on cybersecurity, technical writing, and building secure systems.

Why You Shouldn't Treat All Vendors Equally: The Key to Scalable TPRM

February 10, 2026

The biggest mistake TPRM programs make is treating every vendor equally. Here's a framework for triaging vendors based on inherent risk.

tprmrisk-managementgrc
5 min read

SOC 2 Type II Explained: Everything You Need to Know in Plain English

July 16, 2025

A plain-English walkthrough of SOC 2 Type II reports — what's inside them, how to read them, and why they matter for your organization.

soc-2compliancegrc
11 min read

Everything You Need to Know About Security, Compliance & Governance

May 8, 2025

A clear breakdown of the terms you'll encounter in information security — policies, standards, frameworks, regulations, and how compliance actually works.

cybersecuritycompliancegovernance
5 min read

A Beginner's Guide to ISO 27001 Certification

April 30, 2025

Want to understand how ISO 27001 certification actually works? Here's a simplified breakdown of clauses, Annex A, the certification process, and the Statement of Applicability.

iso-27001compliancecybersecurity
6 min read

Digital Certificate and Its Use in Secure Communication

February 22, 2025

How does your browser know a website is real? Learn how digital certificates, public keys, and session keys work together to keep your data safe.

cybersecurityencryptionnetworking
5 min read

Difference Between Threat, Vulnerability, and Risk

February 1, 2025

Threat, vulnerability, and risk are often used interchangeably — but they mean very different things in cybersecurity. Here's a clear breakdown.

cybersecurityrisk-managementfundamentals
3 min read