Tag: compliance
-
CCPA: Understanding how synthetic data can help achieve compliance
You’ve probably felt the pain of trying to move fast while navigating a growing maze of privacy rules. Learn how synthetic data helps your organization comply with CCPA. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ccpa-understanding-how-synthetic-data-can-help-achieve-compliance/
-
Compliance-Optimierung – Das Dilemma der Schatten-IT
Tags: complianceFirst seen on security-insider.de Jump to article: www.security-insider.de/schatten-it-kosten-risiken-und-software-experience-verbesserung-a-0047c37ffddda382afc8ed045fc29621/
-
Do AI-driven security systems empower compliance
Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards Non-Human Identities (NHIs) and Secrets Security Management as key components in empowering compliance and enhancing……
-
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
Tags: access, ai, application-security, attack, authentication, awareness, backdoor, breach, business, captcha, cloud, compliance, container, control, credentials, credit-card, cybersecurity, data, data-breach, ddos, defense, encryption, exploit, finance, firewall, flaw, google, identity, infrastructure, intelligence, leak, malicious, mitigation, monitoring, network, pypi, risk, service, software, strategy, supply-chain, threat, tool, vulnerability, windows2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 andrew.gertz@t“¦ Thu, 01/15/2026 – 16:48 Nadav Avital – Senior Director of Threat Research at Thales More About This Author > 2025 was a year that tested how businesses think about security. Some attacks happened in new, unexpected ways, while others employed old tricks, taken…
-
KI-gestützte Governance – Vom regulatorischen Labyrinth zur praktikablen Compliance
First seen on security-insider.de Jump to article: www.security-insider.de/ki-unternehmen-governance-a-e1facfd75fdbbf8b4412f664bf69c913/
-
Ransomware gangs extort victims by citing compliance violations
Tags: ai, attack, breach, compliance, data, data-breach, extortion, group, ransomware, regulation, threat, toolAI amplifies attacks: Hild points to another problem: “AI-powered tools dramatically accelerate these attacks. Criminals can now screen stolen documents for ‘material’ compliance violations within hours of a data breach, faster and more accurately than many companies can audit their own systems.”The SailPoint specialist explains: “They create detailed, legally sound complaints for authorities and set…
-
Court Axes Investor Lawsuit Over CrowdStrike Software Update
Misstatement Claims Tossed in Class-Action Securities Case After CrowdStrike Outage. A U.S. district judge tossed most claims from investors accusing CrowdStrike of misrepresenting its software testing rigor before a July 2024 outage. The judge said two statements about federal compliance could plausibly be misleading, but said plaintiffs failed to establish intent or recklessness. First seen…
-
The multibillion-dollar AI security problem enterprises can’t ignore
AI agents are supposed to make work easier. Butthey’realso creating a whole new category of security nightmares. As companies deploy AI-powered chatbots, agents, and copilots across their operations, they’re facing a new risk: How do you let employees and AI agents use powerful AI tools without accidentally leaking sensitive data, violating compliance rules, or opening…
-
How WitnessAI raised $58M to solve enterprise AI’s biggest risk
As companies deploy AI-powered chatbots, agents, and copilots across their operations,they’refacing a new risk: how do you let employees and AI agents use powerful AI tools without accidentally leaking sensitive data, violating compliance rules, oropening the door to prompt-based injections? Witness AI just raised $58 million to find a solution, building what they call >>the…
-
How WitnessAI raised $58M to solve enterprise AI’s biggest risk
As companies deploy AI-powered chatbots, agents, and copilots across their operations,they’refacing a new risk: how do you let employees and AI agents use powerful AI tools without accidentally leaking sensitive data, violating compliance rules, oropening the door to prompt-based injections? Witness AI just raised $58 million to find a solution, building what they call >>the…
-
How WitnessAI raised $58M to solve enterprise AI’s biggest risk
As companies deploy AI-powered chatbots, agents, and copilots across their operations,they’refacing a new risk: how do you let employees and AI agents use powerful AI tools without accidentally leaking sensitive data, violating compliance rules, oropening the door to prompt-based injections? Witness AI just raised $58 million to find a solution, building what they call >>the…
-
The multi-billion AI security problem enterprises can’t ignore
AI agents are supposed to make work easier. Butthey’realso creating a whole new category of security nightmares. As companies deploy AI-powered chatbots, agents, and copilots across their operations, they’re facing a new risk: how do you let employees and AI agents use powerful AI tools without accidentally leaking sensitive data, violating compliance rules, or opening…
-
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Tags: access, ai, authentication, breach, business, communications, compliance, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, defense, government, grc, group, identity, incident response, infosec, infrastructure, malware, monitoring, phishing, ransomware, risk, risk-management, service, supply-chain, technology, theft, threat, toolFor government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense…
-
CISO Assistant: Open-source cybersecurity management and GRC
CISO Assistant is an open-source governance, risk, and compliance (GRC) platform designed to help security teams document risks, controls, and framework alignment in a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/14/ciso-assistant-open-source-cybersecurity-management-grc/
-
Der EU AI Act Wenn Compliance zur KI-Strategie wird
Der EU AI Act erfordert eine systematische Auseinandersetzung mit KI im Unternehmen von der Inventarisierung über die Risikobewertung bis zur technischen Dokumentation. Unternehmen, die heute beginnen, verschaffen sich zeitliche Puffer für Iterationen und organisatorisches Lernen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/der-eu-ai-act-wenn-compliance-zur-ki-strategie-wird/a43340/
-
Ransomware-Banden erpressen Opfer mit Compliance-Verstößen
Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck.Ransomware-Attacken zählen nach wie vor zu den häufigsten Angriffsmethoden. Wie aktuelle Analysen zeigen, drohen Cyberbanden ihren Opfern nun vermehrt damit, Verstöße gegen Vorschriften wie die DSGVO an die Aufsichtsbehörden zu melden.So haben Forscher des Security-Anbieters Akamai bereits in den vergangenen zwei Jahren einen zunehmenden Trend bei dieser…
-
For application security: SCA, SAST, DAST and MAST. What next?
Tags: advisory, ai, application-security, automation, best-practice, business, cisa, cisco, cloud, compliance, container, control, cve, data, exploit, flaw, framework, gartner, government, guide, ibm, incident response, infrastructure, injection, kubernetes, least-privilege, ml, mobile, network, nist, resilience, risk, sbom, service, software, sql, supply-chain, threat, tool, training, update, vulnerability, waf<img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all&w=1024" alt="Chart: Posture, provenance and proof." class="wp-image-4115680" srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all 1430w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=768%2C431&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1024%2C575&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”575″ sizes=”auto, (max-width: 1024px) 100vw, 1024px” /> Sunil GentyalaOver the past year the community has admitted the obvious: the battleground is the software supply chain and…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
Vereinbarkeit von KI und Compliance – GenAI-Firewalls schützen sensible Daten bei KI-Interaktionen
First seen on security-insider.de Jump to article: www.security-insider.de/genai-firewall-ki-compliance-confidential-computing-a-b69ec99550be5a3d51876bdebc89b2fd/
-
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
No matter what new laws or regulations make the cut for 2026, it’s clear that compliance challenges will persist and federal legislation will be limited. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/navigating-privacy-and-cybersecurity-laws-in-2026-will-prove-difficult
-
Tenable Is a Gartner® Peer Insights Customers’ Choice for Cloud-Native Application Protection Platforms
Tags: ai, api, attack, automation, banking, ciso, cloud, compliance, control, cybersecurity, data, detection, gartner, google, governance, healthcare, identity, infrastructure, microsoft, risk, risk-management, service, software, strategy, technology, tool, vulnerability, vulnerability-managementThis recognition, based entirely on feedback from the people who use our products every day, to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helping organizations worldwide, across all industry sectors, preemptively close critical…
-
Unlock remote work’s GRC impact: Challenges to opportunities
As organizations worldwide recalibrate their operations in the wake of unprecedented change, remote work has emerged not simply as a fleeting trend but as a mainstay of modern business. For compliance experts and leaders alike, this shift has introduced a complex interplay of governance, risk management, and compliance (GRC) challenges and opportunities. This article explores…The…
-
Rapid7 increases focus on compliance
With customers struggling to deal with audits and rising levels of regulations, the vendor is setting out to arm its channel with more options First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366637149/Rapid7-increases-focus-on-compliance
-
Intersec Dubai highlights why AI has become critical in the race against cyber attackers
Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637147/Intersec-Dubai-highlights-why-AI-has-become-critical-in-the-race-against-cyber-attackers
-
NIS2, KRITIS, ISO und DORA verlässlich einhalten: Wie digitale Zwillinge die IT-Compliance sichern
Ob NIS2, KRITIS, ISO oder DORA das regulatorische Umfeld für den Betrieb von IT-, Rechenzentrums- und Netzwerkinfrastrukturen war noch nie so dynamisch wie heute. Um die steigenden Compliance-Anforderungen erfolgreich zu meistern, sind Verantwortliche auf intelligente Lösungen und Tools angewiesen. Eine wichtige Rolle hierbei spielt ein digitaler Zwilling der Infrastruktur. Er ermöglicht eine hohe strategische… First…
-
Can Agentic AI reduce the burden of compliance?
How Agentic AI Can Reduce the Compliance Burden Have you ever wondered how much time and resources your organization spends on meeting compliance obligations? Regulatory is complex and changing, creating a significant burden for organizations striving to maintain compliance, especially in sectors like financial services and healthcare. Agentic AI is emerging as a promising solution……
-
18. Security Forum der TH Brandenburg: Unternehmenssicherheit, Compliance und Resilienz im Fokus
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/18-security-forum-th-brandenburg-unternehmenssicherheit-compliance-resilienz-fokus

