Tag compliance

HHS Requests Industry Feedback on AI Solutions to Combat Healthcare Fraud

Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime , Fraud Risk Management Information Request Initiated Amid Expanded Medicare and Medicaid Fraud Enforcement Marianne Kolbasuk McGee (HealthInfoSec) • February 26, 2026     The Centers for Medicare and Medicaid will leverage advanced AI technologies to improve fraud detection and…

Read MoreHHS Requests Industry Feedback on AI Solutions to Combat Healthcare Fraud

Marquis Files Lawsuit Against SonicWall Over 2025 Firewall Data Breach

Third Party Risk Management, Data Security, Governance & Risk Management Lawsuit Alleges SonicWall Cloud Backup Vulnerability Led to Ransomware Attack on Marquis Michael Novinson (@MichaelNovinson) • February 25, 2026 Marquis Software Solutions has initiated legal action against SonicWall, asserting that the company inadequately represented the seriousness of a breach in…

Read MoreMarquis Files Lawsuit Against SonicWall Over 2025 Firewall Data Breach

Webinar | From Compliance to Cyber Preparedness: Bridging the Gap

Webinar Announcement: Bridging the Gap from Compliance to Cyber Readiness In today’s rapidly evolving digital landscape, businesses face increasing challenges when securing their data against cyber threats. A significant upcoming webinar, titled “From Compliant to Cyber Ready: Closing the Gap,” aims to address these very concerns. This session focuses on…

Read MoreWebinar | From Compliance to Cyber Preparedness: Bridging the Gap

Strengthening Government Systems: A Webinar on Cyber Resilience Against Ransomware and AI Threats

Brought to you by Rubrik 60 Minutes In the landscape of cybersecurity, simply meeting compliance standards is insufficient for maintaining the continuity of critical services, especially when faced with sophisticated adversaries employing ransomware tactics. Genuine resilience requires a steadfast governance framework, a well-practiced incident response, and a recovery strategy that…

Read MoreStrengthening Government Systems: A Webinar on Cyber Resilience Against Ransomware and AI Threats

Proofpoint Acquires Startup Acuvity to Enhance AI Security Solutions

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Acquisition Addresses GenAI Risks, Prompt Injection Threats, and Autonomous Agent Security Michael Novinson (MichaelNovinson) • February 13, 2026 Ryan Kalember, Chief Strategy Officer at Proofpoint (Image: Proofpoint) In a strategic move to enhance its AI security capabilities, Proofpoint announced its…

Read MoreProofpoint Acquires Startup Acuvity to Enhance AI Security Solutions

Live Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance

Governance & Risk Management: Embracing Zero Trust Presented by Microsoft Duration: 60 minutes As federal agencies progress through their Zero Trust implementations, many encounter challenges in translating strategic goals into actionable, measurable outcomes. This webinar aims to shed light on how artificial intelligence (AI) can support security teams in refining…

Read MoreLive Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance

TRM Labs Secures $70M in Series C Funding to Enhance AI Crime-Fighting Efforts

Blockchain & Cryptocurrency, Cryptocurrency Fraud, Cybercrime Funding Secured at $1B Valuation to Enhance AI-Driven Investigative and Compliance Solutions Michael Novinson ( @MichaelNovinson) • February 4, 2026 Esteban Castano, co-founder and CEO of TRM Labs (Image: TRM Labs) TRM Labs, a blockchain analytics and AI solution vendor founded by a former…

Read MoreTRM Labs Secures $70M in Series C Funding to Enhance AI Crime-Fighting Efforts

Addressing Cloud Security Gaps Through Runtime Protection

The increasing adoption of cloud-native technologies among organizations has rendered traditional security measures inadequate for combating contemporary threats. While tools such as configuration management and vulnerability scanning play important roles in securing cloud environments prior to deployment, new security vulnerabilities often emerge during runtime—when applications, containers, and workloads are operational.…

Read MoreAddressing Cloud Security Gaps Through Runtime Protection