Compass IT Compliance Blog

HIPAA 2026 Security Rule Overhaul: Why the Stryker Attack Matters

HIPAA 2026 Security Rule Overhaul Why the Stryker Attack Matters

On March 11, 2026, the Iran-aligned hacktivist group Handala launched a devastating cyberattack on Stryker Corporation, one of the largest medical device companies in the United States, framing it as retaliation for U.S.-Israeli military strikes that killed civilians in Iran. The atta …

Read Story

We Let AI Run a Penetration Test. Here's What It Got Wrong.

We Let AI Run a Penetration Test. Here's What It Got Wrong.

AI is transforming cybersecurity. From threat detection to vulnerability scanning, organizations are racing to integrate artificial intelligence into their security programs. And for good reason. AI tools can scan faster, cover more ground, and work around the clock without fatigue. B …

Read Story

The Gap Between Compliant & Secure Is Where Breaches Live

The Gap Between Compliant & Secure Is Where Breaches Live

There's a conversation happening in boardrooms, IT departments, and leadership meetings across every industry right now, and it usually starts the same way: "Are we compliant?"

Read Story

What the SEC Wants to See in Your 10-K Cybersecurity Disclosure

United States Securities and Exchange Commission

If you follow publicly traded companies closely, you may have noticed something tucked into their annual reports over the past few years that wasn't always there before: a section called "Item 1C – Cybersecurity." For investors, compliance professionals, and business leaders alike, th …

Read Story

The Penetration Testing Industry Has an Automation Problem

The Penetration Testing Industry Has an Automation Problem

The cybersecurity industry has a new buzzword problem, and this one could leave your organization dangerously exposed.

Read Story

What to Expect When Working with an IT Compliance Partner

What to Expect When Working with an IT Compliance Partner

Bringing on an IT compliance partner is a significant decision, one that often comes with as many questions as it does relief. Whether your organization has just experienced a security incident, is preparing for an audit, or has simply reached a point where internal resources can no l …

Read Story

Subscribe by email