By:
Todd Connor
December 19th, 2023
In the latest revision of documents pertinent to the ongoing CMMC countdown, NIST SP 800-171 R3 has been released. Though there were only a handful of changes in this new version, there were some significant ones regarding the assessment practices and their presentation that those monitoring the progress of CMMC should know.
By:
Chris Lippert
December 14th, 2023
Since the introduction of the new Data Privacy Framework (DPF) on July 17, 2023, many have begun familiarizing themselves with its seven principles as they ready themselves to comply. However, the DPF also features 16 supplemental principles, two of which—regarding self-certification and verification—also cover particularly important topics.
Cybersecurity Assessments | Artificial Intelligence
By:
Avani Desai
December 11th, 2023
After 22 grueling hours of negotiations, policymakers within the European Union (EU) have reached a provisional agreement on new rules to govern the most powerful artificial intelligence (AI) models. They’re calling it the EU AI Act, and though yes—the provisions have been hashed out—disagreements surrounding the law enforcement of said provisions have led to a recess in the negotiations.
By:
Schellman
December 7th, 2023
While they have become increasingly prevalent in modern life, offering opportunities for efficiency, automation, and improved decision-making in various domains, the proliferation of IoT devices also raises important considerations related to security, privacy, data management, and interoperability.
By:
Todd Busswitz
December 5th, 2023
A complete understanding of your cardholder data environment (CDE) is a cornerstone of a successful PCI DSS compliance program, but for that, you need to ensure you include all the systems, technologies, processes, and people that comprise it because if not, an omission or lack of controls applied could lead to non-compliance.
By:
Kate Callans
November 30th, 2023
The European Union (EU) has made significant strides lately in shaping cybersecurity regulation—new developments include those related to the NIS2 Directive, the EU Cybersecurity Act, the EU Cloud Services Cybersecurity Scheme (EUCS), and the EU Cyber Resilience Act.
Penetration Testing | Red Team Assessments
By:
Josh Tomkiel
November 28th, 2023
If you’ve decided to undergo a red team assessment and engaged Schellman to perform it, you may be wondering what the next steps entail—as in, how will the next stages of the process work and what should you expect?
By:
Schellman
November 21st, 2023
With the escalation of climate and various environmental, social, and governance (ESG)-related risks, organizations are now actively setting bold sustainability objectives, and in recognition of the related concerns in their supply chains over which they lack control, companies are also asking for cooperation from their vendors in addressing their emissions to further minimize their environmental impact.