Compliance & Regulatory
Regulatory frameworks decoded: what changed, what the auditors check, what the fines are when you get it wrong.
20 posts in this cluster
PCI DSS 4.0: The March 2025 Mandate That's Still Biting E-Commerce
PCI DSS 4.0 became mandatory March 31, 2025. A year later, e-commerce merchants are still flunking compliance assessments, QSAs are being stricter, and payment processors are issuing non-compliance notices. A practical walkthrough of what actually changed from 3.2.1, the requirements biting merchants hardest, and how to actually pass a 4.0 assessment.
What ChatGPT, Claude, and Gemini Actually Keep About You
Every AI chatbot retains your conversations. Retention periods, training use, law enforcement access, and breach history vary dramatically. A practical data privacy map of ChatGPT, Claude, Gemini, Copilot, Grok, and Meta AI. Including the NYT v. OpenAI court order requiring indefinite retention.
Your Encryption Has an Expiration Date
Every HTTPS connection, Signal chat, and VPN on the internet relies on crypto that quantum computers will break. NIST finalized the replacements in 2024. A post-quantum cryptography migration guide for application security and compliance teams.
Inside a Ransomware Gang: HR Departments, Salaries, and Bonuses
Ransomware-as-a-Service operations like LockBit, BlackCat, and Cl0p run on affiliate economics. The business model evolution from ransomware attacks to double-extortion, and what it means for incident response and cyber insurance.
EU NIS2 Directive: Why US Companies Need to Care
NIS2 became enforceable across EU member states in October 2024. It's Europe's biggest cybersecurity regulation since GDPR, covering 100,000+ entities across 18 critical sectors. And. Surprise to many US companies. It affects any non-EU company that provides services to EU customers in covered sectors. Penalties up to €10M or 2% of global revenue. A practical guide to whether NIS2 applies to you and what to do about it.
US State Data Privacy Laws 2026: The Complete Matrix Every Business Needs
If you do business in the US, you are likely subject to multiple state data privacy laws. California, Colorado, Connecticut, Virginia, Utah, Texas, Oregon, and a growing list of states have active laws with enforcement authority. A practical matrix of what each law requires, the thresholds that trigger applicability, and the unified compliance approach that handles all of them.
Clearview AI's Privacy Settlement: Victims Are Now Shareholders
Clearview AI scraped 30+ billion photos from public internet to build a facial recognition system sold to law enforcement. A landmark $52 million ACLU settlement followed. A data privacy and facial recognition investigation.
Healthcare Ransomware in 2026: Why 118 Breaches in Two Months Is a Warning
118 healthcare data breaches in the first two months of 2026. 9.6 million patients affected. Healthcare is now the most targeted industry for ransomware. 22% of all attacks globally. A deep dive into the attack patterns, the regulatory pressure, the compliance landscape (including the proposed HIPAA pentest mandate), and what healthcare CISOs should be doing right now.
$438 Million Stolen: The LastPass Breach Three Years Later
The LastPass breaches cost users $438 million in cryptocurrency theft and destroyed enterprise trust in cloud password managers. A deep dive into the breach timeline, architectural failures, and password manager security comparisons.
Why Your Cyber Insurance Won't Pay: The Denial Patterns You Need to Know About
Cyber insurance premiums are up 50-100%. Policy exclusions have quintupled in six years. Payouts are routinely denied for reasons that aren't obvious until your claim is rejected. A detailed walkthrough of how carriers deny claims in 2026, the exclusions biting hardest, and what your organization should be doing to actually get paid when you need to.
The $434 Billion Industry That Knows Where You Sleep
The US data broker industry is a $200+ billion economy selling everything from your home address to your health conditions. A data privacy investigation with opsec guidance for consumer cybersecurity.
The SaaS Vendor Security Audit Checklist: What to Ask Before You Buy
Your organization uses 150+ SaaS vendors. Any one of them could be a breach that exposes your customer data. A practical procurement security audit checklist. The questions to ask every new SaaS vendor, the contract clauses that protect you, the ongoing monitoring that catches vendor degradation, and the decision framework for whether a specific vendor is worth the risk.
Texas SB 2610: The Safe Harbor Most Texas Businesses Don't Know They Qualify For
Texas SB 2610 created a cybersecurity safe harbor defense against lawsuits for Texas businesses that implement recognized frameworks like NIST 800-53, HITRUST CSF, ISO 27001, or the Texas Cybersecurity Framework. Most Texas small-and-mid-size businesses have never heard of it. Here's how it works, what qualifies, and the documentation trail you need to actually invoke the defense in court.
NYDFS 23 NYCRR 500 in 2026: The Amendments That Just Changed Everything
The November 2023 amendments to 23 NYCRR 500 rolled out in phases through 2025 and 2026. If you are a Covered Entity and still operating under the 2017 baseline, you are already out of compliance. Full breakdown of what changed, enforcement patterns, and implementation checklist.
The SEC 4-Day Breach Rule: What Public Companies Actually Have to Do
Since December 2023, public companies in the US must disclose material cybersecurity incidents on Form 8-K within four business days. Two years in, companies are still getting the rule wrong. Both over-disclosing non-material incidents and under-disclosing material ones. A practical walkthrough of what the rule requires, what materiality actually means, and the governance framework public companies need in place before an incident happens.
ISO 27001 vs SOC 2 in 2026: Which Certification Wins Deals, and When You Need Both
Your enterprise prospect just asked for "your SOC 2" or "your ISO 27001" and procurement will not move without it. Here is the 2026 comparison. What each certification actually covers, what it costs, how long it takes, and the dual-certification path most B2B SaaS companies end up on by Series B.
CMMC 2.0: The Cybersecurity Certification Every DoD Contractor Needs
CMMC 2.0 rolled out in phases starting late 2024. By 2028, every DoD contractor handling Controlled Unclassified Information will need formal certification. Level 1 for small vendors, Level 2 for most primes, Level 3 for highest-sensitivity work. Contractors who don't have it lose DoD contract eligibility. A practical walkthrough of the framework, assessment process, and preparation roadmap.
HIPAA's Proposed Pentest Mandate: What Healthcare Organizations Need to Know
HHS proposed the most substantial HIPAA Security Rule update in two decades in January 2025. Mandatory annual penetration testing, formal vulnerability scanning, network-segmentation requirements, and tightened encryption standards. The rule isn't final yet but healthcare organizations have a 12-24 month window to get ready. Or be out of compliance on day one.
Keycloak: Realm Configuration Tells You Everything
Keycloak is enterprise identity and access management. And a high-value target. Publicly exposed realms, enabled self-registration, and console access lead to full SSO compromise. A penetration testing guide to IAM security audits and incident response.
MongoDB: The Database That Ships Without a Lock
MongoDB deployed with --bind_ip 0.0.0.0 and no authentication is still being indexed by Shodan in 2026. The ransomware groups know it. A reminder of why database penetration testing and vulnerability assessments matter for compliance.
Jump to another topic
Apply this research to your environment
Our engagements apply the same research methodology surfaced in these posts to your specific stack. Start with a free security check.
