Upcoming Webinar | Assuring Agentic AI on March 5th @ 1:00 PM ET

Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

The Schellman Blog

Blog Feature

Penetration Testing | Artificial Intelligence

By: Josh Tomkiel
February 9th, 2026

Artificial intelligence is reshaping the cyber threat landscape as attackers have already begun weaponizing AI to dramatically accelerate phishing, reconnaissance, payload development, and attack execution.

Blog Feature

Federal Assessments | CMMC

By: Todd Connor
February 4th, 2026

The long-anticipated Cybersecurity Maturity Model Certification (CMMC) Final Rule, published on September 10, 2025, officially became effective November 10, 2025. This shift from voluntary guidance to mandatory, enforceable contract requirements under the Defense Federal Acquisition Regulation Supplement (DFARS) marks a turning point for every organization that supports the federal defense supply chain. This critical milestone also signifies that full implementation is just beginning.

Blog Feature

News | Artificial Intelligence

By: Schellman
February 3rd, 2026

TAMPA, Fla. and SAN FRANCISCO, February 3, 2026 – Schellman, a leading provider of attestation and compliance services, today becomes the first authorized auditor of AIUC-1, the comprehensive security, safety, and reliability standard for AI agents, marking a significant milestone in AI compliance. As enterprises accelerate AI adoption and systems become more agentic, they face mounting challenges: security leaders confront novel attack vectors, legal teams navigate uncertain liability, and procurement processes slow under bespoke risk assessments. AIUC-1 addresses these challenges with a comprehensive, actionable standard specifically designed for AI agents.

Blog Feature

Cybersecurity Assessments | Cloud Computing

By: Steve Caruso
January 29th, 2026

Cloud computing has become foundational for how businesses and governments deliver services, store sensitive data, and scale operations. As organizations increasingly rely on third-party cloud providers, it is critical to have verifiable assurance that these providers implement robust security controls aligned with the sensitivity of the data and workloads they host.

Blog Feature

ISO Certifications | Artificial Intelligence | ISO 42001

By: Danny Manimbo
January 20th, 2026

The information in this article was originally presented on January 15, 2026, at a Public Hearing to the New York State Senate Standing Committee on Internet and Technology to discuss risks, solutions, and best practices with respect to the use of artificial intelligence in consequential or high-risk contexts, and related issues.

Blog Feature

FedRAMP | Federal Assessments

By: Nick Rundhaug
January 12th, 2026

As the Department of Defense (DoD) continues to accelerate its Zero Trust strategy, organizations supporting national security missions face increasing expectations for how they secure, monitor, and manage sensitive information.

Blog Feature

Education | ISO Certifications | Artificial Intelligence | ISO 42001

By: Schellman
January 6th, 2026

As interest in ISO 42001 certification has surged over the past year, we've heard a steady stream of questions from organizations seeking to build their AI governance strategy and operationalize their Artificial Intelligence Management Systems (AIMS) responsibly. From understanding practical preparation steps to what to expect during the audit, many teams are looking for clearer guidance as they navigate this newer management system standard.

Blog Feature

Privacy Assessments

By: Chris Lippert
December 17th, 2025

As organizations expand their digital footprints and adopt AI at scale, global privacy expectations are rising worldwide. At the same time, cyber threats are growing more sophisticated, further driving the need for more advanced, resilient privacy programs to meet both regulatory and security demands.

{