ChaptersEventsBlog
Prove your skills in Illumiverse Labs’ Breach Containment CTF. Register now to stop attackers.

Announcements

Announcements
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents in the SOC

October 6, 2025

From Compliance to Culture: What CISOs Need to Know About Evolving SAT
From Compliance to Culture: What CISOs Need to Know About Evolving SAT

October 1, 2025

Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP
Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP

September 23, 2025

An Update on European Compliance: NIS2, CRA, DORA
An Update on European Compliance: NIS2, CRA, DORA

September 17, 2025

Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region

September 16, 2025

Understanding HIPAA: Key Regulations and Compliance
Understanding HIPAA: Key Regulations and Compliance

September 2, 2025

The Urgent Need for Hypervisor Security in Healthcare
The Urgent Need for Hypervisor Security in Healthcare

August 26, 2025

What Internal Auditors Wish Every Company Knew About SOC 2
What Internal Auditors Wish Every Company Knew About SOC 2

August 25, 2025

A Breakdown of the ISO 27001 Certification Process
A Breakdown of the ISO 27001 Certification Process

August 21, 2025

Looking Back on a Successful Social Engineering Attack: Retool 2023
Looking Back on a Successful Social Engineering Attack: Retool 2023

August 18, 2025

Assets Under Attack: Email Threats Targeting Financial Services Jump 25%
Assets Under Attack: Email Threats Targeting Financial Services Jump 25%

August 13, 2025

Are Your Hypervisors SOC 2 Ready? Why Virtualization Security is Crucial for Compliance
Are Your Hypervisors SOC 2 Ready? Why Virtualization Security is Crucial for Compliance

August 5, 2025

How GenAI Is Reshaping GRC: From Checklists to Agentic Risk Intelligence
How GenAI Is Reshaping GRC: From Checklists to Agentic Risk Intelligence

July 24, 2025

Register Now: Revolutionizing Compliance and Third-Party Governance
Register Now: Revolutionizing Compliance and Third-Party Governance

July 17, 2025

Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trusted Execution Environment

July 14, 2025

Watch On-Demand: The CSA Enterprise Authority to Operate (EATO) Framework
Watch On-Demand: The CSA Enterprise Authority to Operate (EATO) Framework

June 30, 2025

Navigating the Human Factor: Addressing Employee Resistance to AI Adoption
Navigating the Human Factor: Addressing Employee Resistance to AI Adoption

June 25, 2025

Join the Regulatory Analysis and Compliance Engineering Working Group
Join the Regulatory Analysis and Compliance Engineering Working Group

June 23, 2025

Protecting the Weakest Link: Why Human Risk Mitigation is at the Core of Email Security
Protecting the Weakest Link: Why Human Risk Mitigation is at the Core of Email Security

June 20, 2025

NIST AI RMF: Everything You Need to Know
NIST AI RMF: Everything You Need to Know

June 16, 2025