Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CMMC Requirements for AI Systems: What Assessors Actually Look For

Josh Rector is the Compliance Director, Public Sector at Ace of Cloud, a security and compliance consulting firm, certified CMMC Third-Party Assessor Organization (C3PAO), and Registered Provider Organization (RPO). With more than a decade of experience in cybersecurity compliance, he has worked both sides of the assessment table, leading internal and external assessments, serving as ISSO for systems at federal agencies, and guiding cloud service providers through the FedRAMP authorization process.

What Is ISO 42001 and How Does It Relate to ISO 27001?

Depending on the field in which you work, you’ve almost definitely encountered an ISO standard. While these might not seem like they have much to do with one another, the chain that binds them all together is ISO itself. ISO, the International Organization for Standardization, and the 800+ committees that serve as expert boards in different fields, develop international standards to which businesses and organizations can be held.

The AI Compliance Gap No One's Talking About (ISO, NIST, EU AI Act)

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Proven incident response and business continuity strategy

From cybersecurity breaches to natural disasters, disruptive events can occur suddenly and without warning. As a result, it is crucial for organizations to develop resilient plans that not only respond to incidents in real time but also ensure long-term operational survivability. This article examines the concepts of incident response and business continuity, exploring their differences and similarities while offering practical strategies to integrate them into a cohesive operational plan.

The Ultimate Guide to CPS 234 Requirements

TLDR; As compliance requirements tighten globally, Australia has taken a decisive step with the introduction of Prudential Standard CPS 234 Information Security, setting a clear baseline for how financial institutions must protect themselves and the people who trust them. Australia’s financial services sector remains one of the most targeted in the world, with high-profile breaches exposing millions of records.

SOC 2 Type 1 vs Type 2: What Security Leaders Need to Know About Audit Readiness

Security and compliance teams don't spend much time debating definitions. They focus on whether controls actually work in practice. That's why understanding the difference between SOC 2 Type 1 and Type 2 matters. The choice affects how controls are designed, how they are tested, and how customers evaluate your security posture. At a high level, Type 1 evaluates whether controls are properly designed at a specific point in time. Type 2 evaluates whether those controls operate effectively over a defined period, typically three to twelve months.
Featured Post

The UK's Cyber Action Plan marks the end of compliance-led security

The UK government's new £210 million Cyber Action Plan signals an important shift in how cyber risk is being addressed at a national level. Designed to strengthen cyber defences across government departments and the wider public sector, the plan establishes a new Cyber Unit and introduces stronger expectations around resilience, accountability and operational capability.

The 4 best Trust Center products for 2026

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

How LevelBlue's FedRAMP Authorization Removes the Burden of CMMC Federal Compliance from Clients

Navigating the labyrinth of the U.S. federal procurement system, especially for Defense Industrial Base (DIB) companies, can be challenging, particularly when trying to meet stringent cybersecurity compliance standards like the Cybersecurity Maturity Model Certification (CMMC).