Blog Posts

Lessons from the Field, Part III: Why Backups Alone Won’t Save You
James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at ...

CMMC is Here: Simplifying Compliance with Enclaves
A joint blog featuring CISO Global’s Compliance Team & PreVeil The long-anticipated CMMC rule (CFR 32) is now live, marking a crucial turning point for defense contractors. The Compliance Team at CISO ...

The Future of Auditing: What to Look for in 2025
The 2025 audit landscape is shaped by new regulations and changes in enforcement of existing regulations. In the United States, both changes to longstanding administrative law and the Public Company Accounting Oversight ...

What is CCPA Compliance? A Beginner’s Guide
Navigating the world of data privacy can feel like learning a new language, especially when acronyms like “CCPA” start popping up in every conversation. If your organization collects, processes, or sells personal ...

New Guidelines: Cybersecurity Resilience in the Healthcare Industry
Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human ...

3 Steps to Take to Meet DORA Compliance Before April 30, 2025
Chief Information Security Officers (CISOs) face an important milestone on April 30th, 2025: ensuring their organizations are ready to meet the strict requirements of the EU’s Digital Operational Resilience Act (DORA). By ...

Love, Lies, and Loss: The Rise of Romance Scams
Gary Perkins, CISO at CISO Global While Valentine’s Day is a celebration of love, it’s also a time to be cautious. Scammers prey on our most vulnerable emotions, manipulating those longing for ...

Why 24/7 Security Monitoring Matters for Your Company
Gary Perkins, CISO at CISO Global Cyber threats don’t take evenings or weekends off, and neither should your security team. Companies need peace of mind knowing that dedicated professionals are continuously monitoring ...

SOC 2® Type 2: Preparing for Your First Audit
As a business leader, you know the stakes are high when it comes to data security. Whether you’re a SaaS company, a fintech startup, or a growing enterprise serving clients with stringent ...

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare
David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage ...