The EU AI Act: What CISOs Need to Know About the World’s First AI Regulation
Artificial intelligence is no longer experimental—it’s embedded in critical business functions. From fraud detection and customer engagement to cybersecurity operations and predictive decision-making, AI systems are becoming core to how o...
Read More about The EU AI Act: What CISOs Need to Know About the World’s First AI Regulation
Show Filters
AI Security and Risk: Side-by-side Comparison of AI Compliance and Risk Frameworks
The rapid rise of AI is reshaping security and compliance, but what do the leading frameworks act...
Read More about AI Security and Risk: Side-by-side Comparison of AI Compliance and Risk Frameworks
CMMC Final Rule: Time to Comply
The Cybersecurity Maturity Model Certification (CMMC) Final Rule has been released, bringing sign...
Identity Threat Protection with OKTA
Identity Threat Protection with Okta AI hardens your resilience against today’s toughest attacks.
Worried About HIPAA Revisions? Here’s where SOC, PCI, and ISO may have you covered
While HIPAA will celebrate its 30th birthday next year, the healthcare rule for data privacy made...
Read More about Worried About HIPAA Revisions? Here’s where SOC, PCI, and ISO may have you covered
Preparing for PCI DSS v4.0 Future-Dated Requirements
The Payment Card Industry Data Security Standard (PCI DSS) v4.0 is designed to adapt to the evolv...
Read More about Preparing for PCI DSS v4.0 Future-Dated Requirements
NIST SP 800-171 Revision 3 Finalized: A Whisper in the Roar of CMMC
Although overshadowed by the larger, admittedly more consequential swings in the world of CMMC, N...
Read More about NIST SP 800-171 Revision 3 Finalized: A Whisper in the Roar of CMMC
Board-Level Cybersecurity: Measuring and Communicating Risk to your Board
Join cybersecurity experts Anir Desai, Justin Graham, and Ashli Pfeiffer, along with Bryan Mitche...
Read More about Board-Level Cybersecurity: Measuring and Communicating Risk to your Board
As Generative AI (GenAI) becomes cheaper and more prevalent, more companies are seizing the oppor...
PCI Compliance Checklist Essentials: Steps to Secure Your Business in 2025
In today’s digital-first economy, protecting cardholder data is no longer optional—it’s cri...
Read More about PCI Compliance Checklist Essentials: Steps to Secure Your Business in 2025
Proposed Changes to HIPAA Rules: What You Need to Know
In January 2025, the Department of Health and Human Services (HHS) has proposed significant updat...
Read More about Proposed Changes to HIPAA Rules: What You Need to Know
What is Cloud Penetration Testing?
As businesses make even more of a shift to embrace cloud technologies in support of digital trans...
Proactive Identity Security: Trends for 2025
With Identity threats on the rise, it’s more important than ever to reduce your company’s Ide...
Read More about Proactive Identity Security: Trends for 2025
What is Third-Party Risk Management?
Third-party risk management (TPRM) is the structured process of identifying, assessing, and contr...
What is Network Penetration Testing?
Network penetration testing, or pen testing, simulates cyber-attacks on an organization’s n...
CMMC Program Go Live – What You Need to Know
December 16th, 2024 marks the official launch of the Cybersecurity Maturity Model Certification (...
Read More about CMMC Program Go Live – What You Need to Know
Preparing for PCI DSS v4.0 Future-Dated Requirements
The Payment Card Industry Data Security Standard (PCI DSS) v4.0 is designed to adapt to the evolv...
Read More about Preparing for PCI DSS v4.0 Future-Dated Requirements














