By:
Jacob Handra
July 1st, 2025
Vulnerability scanning is one of the most critical — and commonly misunderstood — requirements in achieving the Federal Risk and Authorization Management Program (FedRAMP) Authorization to Operate (ATO). Cloud Service Providers (CSPs) must demonstrate a mature vulnerability management program to meet FedRAMP’s rigorous standards, requiring the right people, processes, and technologies in place.
By:
Josh Tomkiel
June 24th, 2025
Anytime you're scrolling through cybersecurity news, you’re likely to come across another headline about a data breach featuring quotes from the latest targeted company explaining why their customers’ personal information is now floating around the dark web. And then that familiar knot in your stomach creeps in asking the same question: "Could this happen to us?"
Artificial Intelligence | ISO 42001
By:
Jason Lam
June 17th, 2025
The widespread use of AI is in full force, reshaping industries, economies, societies, and business practices. From healthcare diagnostics and financial forecasting to enhanced education and public services, AI systems are being deployed at unprecedented speed and scale. With its rapid adoption comes both immense benefits and equal amounts of concern over transparency, accountability, fairness, and privacy.
ISO Certifications | Artificial Intelligence | ISO 42001
By:
Jenelle Tamura
June 16th, 2025
As artificial intelligence (AI) technologies become more deeply embedded in business operations, the need for responsible, transparent, and auditable AI management practices has never been more critical. ISO 42001 provides a structured framework to help organizations govern their AI systems responsibly and ethically.
Payment Card Assessments | PCI DSS
By:
Jesse Eldell
June 12th, 2025
Imagine your computer account is like your house in that you need specific keys to get inside where all your valuables are kept. For years, people relied on simple door locks only requiring one key - like a password, as their main form of security. But clever thieves, known as "phishers," have become really skilled at tricking people into handing over copies of their keys (stealing passwords, codes, and authentication tokens). This growing threat has prompted the need for newer and stronger methods of authentication in payment security, such as phishing-resistant authentication.
ISO Certifications | ESG | Artificial Intelligence | ISO 42001
By:
Schellman
June 10th, 2025
This article was featured in the World Economic Forum, written by Schellman’s Jerrad Bartczak, Senior Associate AI, and Stu Block, Sustainability Practice Director.
By:
Chris Lippert
May 28th, 2025
In groundbreaking news, it was announced at the CBPR Forum held in Singapore this week that the Global CBPR System will officially go live on June 2nd, 2025.
By:
Charles Goss
May 20th, 2025
The use of artificial intelligence is rapidly expanding across businesses and industries, driving innovation, improving efficiency, and unlocking new opportunities. However, as AI systems become more integrated into critical decision-making processes and daily business operations, concerns about their ethical and responsible use also continue to rise. Questions surrounding fairness, transparency, and accountability have become increasingly prominent, highlighting the need for a structured approach to evaluating AI’s broader ethical and societal implications.