In December 2023, the introduction of ISO 42001 marked a significant step towards guiding organizations in the responsible engagement with...
Sign up to receive our newsletter and stay up-to-date on industry news, events, our latest articles, and staffing/recruiting opportunities!
Elevate Insights
The Office of Management and Budget (OMB) Publishes the First AI Policy for Government and Federal Agencies.
The White House Office of Management and Budget (OMB) on March 28, 2024, published a memorandum with the subject “Advancing Governance, Innovation,...
CISA Releases Draft Rule for Cyber Incident Reporting
In March 2022, President Biden signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark...
Looking for examples on 8-K Cybersecurity rule disclosures and learn from big breaches?
Speaking with CISOs and other C-Level executives of publicly traded companies about the Final 8-K Cybersecurity rule disclosures starting to take...
Unleashing the Power of AI: A look at the Executive Order
The Artificial Intelligence (AI) Executive Order President Biden has issued on October 30, 2023, is a pivotal moment in the United States’ approach...
Protecting Your Digital World: Celebrating Cybersecurity Awareness Month
October has arrived! And with it comes a vital reminder of our responsibility to safeguard our digital lives. Cybersecurity Awareness Month,...
Preparing for the Quantum Threat
Imagine a world where the most secure encryption methods we rely on today become as vulnerable as a house of cards in a hurricane. Welcome to the...
Vishing Attacks and How to Prevent Them
Despite the rate at which cyber attacks are becoming more and more sophisticated, threat actors know that there’s no replacement for the classic...
AI Readiness – Critical Steps to Preparing Your Company for AI Technology Integration
There’s no mistaking that AI is an inevitable future for most, if not all, large companies and organizations. “If” turned to “when” once generative...
7 Ways to Attract Cybersecurity Talent in a High-Demand Market
With cyber threats growing more numerous and sophisticated by the day, organizations are feeling the heat to find skilled professionals - making the...
How to Keep Your Kids Protected Online
Living in an age where technology plays an integral role in education and entertainment, it has become paramount to ensure that school-aged children...
Cybersecurity Certifications for Beginners and Experts
For anyone interested in pursuing a cybersecurity career, obtaining cybersecurity certifications is of paramount importance. These certifications...
How to Build an Incident Response Plan
In this how-to article, we'll walk you through the essential steps to create a robust and effective incident response plan. Whether you're a...
Signed Sealed Delivered – 2023 US State Privacy Laws
Following the enactment of the California Consumer Privacy Act in 2020, data and privacy protection is quickly becoming one of the most urgent state...
Ensuring Secure AI Integration within Your Cybersecurity Programs
(source: The Edge) As artificial intelligence (AI) continues to advance, the distinction between public and private AI becomes increasingly...
EU AI Act
Earlier this month, the European Parliament took a significant step towards shaping global standards in AI regulation by approving its draft...
SOC 1 Guidance Updates
(Source: BDO USA) Earlier this year, the American Institute of Certified Public Accountants’ (AICPA’s) Auditing Standards Board approved an updated...
SEC’s Groundbreaking Proposal: Strengthening Cybersecurity Defenses for the U.S. Securities Markets
The Securities and Exchange Commission (SEC) has unveiled a proposal that would impose cybersecurity requirements on various entities in the...
The Reality of CISO Burnout
In a world where cyberattacks are becoming increasingly sophisticated and prevalent, organizations need someone at the helm who understands the...
2023 HIPAA Compliance
If you are running a healthcare company and providing medical services to patients - you have access to a lot of sensitive information like medical...
Cyber Confusion – Commonly Misused Cybersecurity Terms
Vishing smishing! (Yes, those are real words) – Cybersecurity verbiage can sometimes throw people for a loop. Whether they are visually similar or...