The Data Policy Engine is the enforcement layer of the Kiteworks secure data exchange platform. It ensures that every piece of sensitive data moving into, out of, or through your organization — whether accessed...
On April 14, 2026, the Government of Canada officially introduced Level 1 of the Canadian Program for Cyber Security Certification (CPCSC), the country’s first mandatory cyber security certification for defence...
CPCSC is Canada's mandatory cyber security certification for defence suppliers handling sensitive unclassified government information. Managed by Public Services and Procurement Canada, the program requires certification across three levels: Level 1 (13...
Israeli government agencies face stringent obligations under Amendment 13 to the Protection of Privacy Law, which establishes explicit requirements for documenting data processing activities. These records serve as the foundation...
Government-adjacent organisations occupy a unique regulatory position. They perform public functions, manage citizen data, and deliver services with public sector characteristics, yet often operate outside traditional civil service frameworks. Amendment...
State and local government agencies are deploying AI across citizen services, public safety, benefits administration, tax enforcement, and court systems at a pace that has outrun the governance frameworks most...
Federal contractors occupy one of the most demanding AI compliance environments in the enterprise market. The regulatory stack they operate under — CMMC 2.0, NIST 800-171, FedRAMP, ITAR, FISMA, and...
Defense contractors are deploying AI agents across proposal development, program documentation, supply chain management, and technical data workflows. Many of these workflows touch controlled unclassified information. That puts them squarely...
Thousands of organizations handle controlled unclassified information under government contracts without being in the CMMC certification pipeline. Federal contractors, research universities, state agencies, technology suppliers, and professional services firms that...
Canadian federal agencies, their contractors, and private sector organizations that handle government-classified information are deploying AI agents across document processing, citizen service workflows, regulatory review, and program administration. Many of...
Defense contractors and aerospace manufacturers are deploying AI agents across proposal development, engineering documentation, technical data package management, and supply chain workflows. Many of these workflows touch controlled technical data...
Most organizations deploying AI agents against regulated data believe they have encryption covered. The API calls use TLS. The data at rest is AES-256. The model hosting provider has a...
On March 18, 2026, ProPublica published an investigation that should alarm every organization that relies on FedRAMP authorization as a trust signal for cloud security. The story is straightforward: Federal...
MMC 2.0 Level 2 (Advanced) Level 2 (Advanced) is the second level of the CMMC 2.0 framework. It is an intermediate level that requires companies to implement more specific practices...
The scarcity of FedRAMP High authorized cloud services is not an abstract compliance concern. It is a procurement bottleneck that forces federal agencies to make security tradeoffs with their most...
Get started.
It’s easy to start ensuring regulatory compliance and effectively managing risk with Kiteworks. Join the thousands of organizations who are confident in how they exchange private data between people, machines, and systems. Get started today.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.