Government
For nearly a decade, European data sovereignty has been argued in courts, conferences, and contract clauses. On May 27, 2026, it is expected to enter EU procurement law. Key Takeaways...
CVE-2026-32202: When a Folder Browse Becomes a Data Breach
On April 27, 2026, Microsoft updated its advisory for CVE-2026-32202 to confirm what Akamai researchers had already documented: the vulnerability was being actively exploited in the wild. CISA followed the...
DSPM Tells You Where the Data Is. Now What?
DSPM has moved from emerging category to mainstream security investment in eighteen months. Recent industry coverage indicates that approximately 30% of UK CISOs are purchasing DSPM solutions in 2026 to...
Another MOVEit Vulnerability. Same Pattern. Different Stakes.
On April 30, 2026, Progress Software disclosed two vulnerabilities in MOVEit Automation, the workflow and scheduling engine that thousands of organizations use to automate enterprise file transfers. The National Vulnerability...
Control Plane DPE
The Data Policy Engine is the enforcement layer of the Kiteworks secure data exchange platform. It ensures that every piece of sensitive data moving into, out of, or through your organization — whether accessed...
CPCSC Certification: Are Canadian Defence Suppliers Ready for 2026?
On April 14, 2026, the Government of Canada officially introduced Level 1 of the Canadian Program for Cyber Security Certification (CPCSC), the country’s first mandatory cyber security certification for defence...
Achieve CPCSC Compliance: Certify Your Defence Supply Chain Without the Complexity
CPCSC is Canada's mandatory cyber security certification for defence suppliers handling sensitive unclassified government information. Managed by Public Services and Procurement Canada, the program requires certification across three levels: Level 1 (13...
How Israeli Government Agencies Maintain Data Processing Records Under Amendment 13
Israeli government agencies face stringent obligations under Amendment 13 to the Protection of Privacy Law, which establishes explicit requirements for documenting data processing activities. These records serve as the foundation...
How Government-Adjacent Organisations Meet Amendment 13 Public Body Requirements
Government-adjacent organisations occupy a unique regulatory position. They perform public functions, manage citizen data, and deliver services with public sector characteristics, yet often operate outside traditional civil service frameworks. Amendment...
AI Compliance Requirements for State and Local Government: What You Need to Know
State and local government agencies are deploying AI across citizen services, public safety, benefits administration, tax enforcement, and court systems at a pace that has outrun the governance frameworks most...
AI Compliance Requirements for Federal Contractors: What You Need to Know
Federal contractors occupy one of the most demanding AI compliance environments in the enterprise market. The regulatory stack they operate under — CMMC 2.0, NIST 800-171, FedRAMP, ITAR, FISMA, and...
CMMC 2.0 and AI Agents: What “Authorized Access” Means for CUI-Touching Workflows
Defense contractors are deploying AI agents across proposal development, program documentation, supply chain management, and technical data workflows. Many of these workflows touch controlled unclassified information. That puts them squarely...
NIST 800-171, CUI, and AI: What Your System Security Plan Is Missing
Thousands of organizations handle controlled unclassified information under government contracts without being in the CMMC certification pipeline. Federal contractors, research universities, state agencies, technology suppliers, and professional services firms that...
Canada ITSG-33 and AI: Meeting CSE’s Security Control Framework in Agentic Environments
Canadian federal agencies, their contractors, and private sector organizations that handle government-classified information are deploying AI agents across document processing, citizen service workflows, regulatory review, and program administration. Many of...
ITAR, AI Agents, and Controlled Technical Data: The Export Control Compliance Gap
Defense contractors and aerospace manufacturers are deploying AI agents across proposal development, engineering documentation, technical data package management, and supply chain workflows. Many of these workflows touch controlled technical data...