Tag: compliance
-
Top 10 Privileged Access Management Solutions for 2026
Privileged Access Management (PAM) solutions have moved from a compliance requirement to a front-line security control. As organizations expand across hybrid cloud, SaaS, DevOps pipelines, non-human identities, and now agentic AI, privileged access has become both more pervasive and more dangerous. Analyst… Read More First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/top-10-privileged-access-management-solutions-for-2026/
-
How are Agentic AI systems ensuring compliance?
Are Non-Human Identities (NHIs) the Missing Piece in Agentic AI Compliance? There’s a silent yet critical player: the Non-Human Identity (NHI). With organizations increasingly adopting Agentic AI systems to streamline operations and enhance compliance, the role of NHIs in securing these systems has never been more crucial. But what exactly are NHIs, and how do……
-
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go through all 5 pillars aka readiness dimensions and see what we can actually do to make your SOC AI-ready. #1 SOC Data Foundations As I said before, this one is my…
-
The New Weak Link in Compliance Isn’t Code It’s Communication
Cybersecurity has never been only a technical problem, but the balance of what truly makes an organization secure has shifted dramatically. For years, the industry assumed the greatest dangers lived in code, in vulnerable servers, old libraries, unpatched systems, and brittle authentication flows. Enterprises poured money and time into shoring up these weaknesses with.. First…
-
Red-Teaming als Eckpfeiler der KI-Compliance
KI-Systeme spielen in allen Branchen zunehmend eine zentrale Rolle bei kritischen Vorgängen. Gleichzeitig steigen die Sicherheitsrisiken durch den Einsatz der künstlichen Intelligenz rapide. Red Teaming hat sich als Eckpfeiler zum Schutz von KI etabliert insbesondere, wenn agentenbasierte KI immer stärkeren Einzug in Unternehmen hält. Multi-LLM (Large-Language-Models)-Systeme treffen autonome Entscheidungen und führen Aufgaben ohne menschliches […]…
-
CCPA Compliance Checklist for 2026: What You Need to Know
Key Takeaways The California Consumer Privacy Act (CCPA) is California’s primary privacy law governing how businesses collect, use, disclose, and protect personal information about California residents. Since its introduction, the law has steadily evolved, expanding both the rights granted to individuals and the expectations placed on organizations that handle personal data. The CCPA law gives……
-
Red Teaming als Eckpfeiler der KI-Compliance
ie zunehmende Verbreitung agentenbasierter KI verändert die Angriffsflächen von Organisationen grundlegend. Im Unterschied zu Assistenten mit einem einzelnen LLM bestehen diese Systeme aus miteinander verbundenen Agenten mit komplexen Arbeitsabläufen und Abhängigkeiten, First seen on infopoint-security.de Jump to article: www.infopoint-security.de/red-teaming-als-eckpfeiler-der-ki-compliance/a43314/
-
Like it or not, AI will transform cyber strategy in 2026
Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637095/Like-it-or-not-AI-will-transform-cyber-strategy-in-2026
-
Zero-Knowledge Compliance: How Privacy-Preserving Verification Is Transforming Regulatory Technology
Traditional compliance often forces companies to expose sensitive information to prove they follow the rules. This approach increases the risk of breaches and raises severe privacy concerns. With rising regulatory pressure and stricter data sovereignty laws, more organizations are exploring zero-knowledge frameworks as a safer alternative. Zero-knowledge proofs (ZKPs) allow businesses to prove adherence without..…
-
Neujahrsputz und Vorsätze Schwachstellen-Management mit dem BSI-Grundschutz
Mondoo unterstützt Organisationen dabei, das BSI-1.5-Compliance-Framework umzusetzen und damit diese große Herausforderung in einen optimierten, automatisierten Prozess zu verwandeln. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neujahrsputz-und-vorsaetze-schwachstellen-management-mit-dem-bsi-grundschutz/a43294/
-
Neujahrsputz und Vorsätze Schwachstellen-Management mit dem BSI-Grundschutz
Mondoo unterstützt Organisationen dabei, das BSI-1.5-Compliance-Framework umzusetzen und damit diese große Herausforderung in einen optimierten, automatisierten Prozess zu verwandeln. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neujahrsputz-und-vorsaetze-schwachstellen-management-mit-dem-bsi-grundschutz/a43294/
-
Passwords are where PCI DSS compliance often breaks down
Most PCI DSS failures do not start with malware or a targeted attack. They start with everyday behavior. Reused passwords. Credentials stored in spreadsheets. Shared logins … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/08/passwords-pci-dds-compliance/
-
Die wichtigsten CISO-Trends für 2026
Tags: ai, ciso, compliance, cyersecurity, group, nis-2, resilience, risk, risk-management, software, supply-chain, tool, zero-trustLesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen.Das Jahr 2025 war für viele CISOs herausfordernd. Anfang des Jahres wurden mit dem Digital Operational Resilience Act (DORA) alle Finanzunternehmen dazu verpflichtet, ihre Cybersicherheit zu erhöhen. Zudem mussten sich in diesem Jahr zahlreiche Unternehmen mit der NIS2-Umsetzung auseinandersetzen. Vor welchen Schwierigkeiten stehen…
-
Der Weg zur CMMC-Compliance
Das Cybersecurity Maturity Model Certification (CMMC) ist ein vom US-Verteidigungsministerium entwickeltes Framework zur Bewertung der Cybersicherheitsreife von Unternehmen in der Defense Industrial Base (DIB). First seen on infopoint-security.de Jump to article: www.infopoint-security.de/der-weg-zur-cmmc-compliance/a43278/
-
8 things CISOs can’t afford to get wrong in 2026
Tags: access, advisory, ai, attack, automation, awareness, breach, business, ciso, cloud, communications, compliance, control, cyber, cyberattack, cybersecurity, data, data-breach, defense, dora, encryption, finance, firmware, GDPR, healthcare, identity, incident response, india, infrastructure, injection, insurance, intelligence, iot, jobs, law, malicious, monitoring, network, privacy, ransom, regulation, resilience, risk, saas, scam, service, software, strategy, supply-chain, tactics, technology, theft, threat, tool, training, update, vulnerability, zero-trust“Identity and access controls for AI agents and AI platforms are one of the most important areas of concern for CISOs,” says Jason Stading, director at global technology research and advisory firm ISG. “Right now, permissions and access rights for AI are a black box in many areas. We will see a major push over…
-
What European security teams are struggling to operationalize
Tags: complianceEuropean security and compliance teams spend a lot of time talking about regulation. A new forecast report from Kiteworks suggests the harder problem sits elsewhere. According … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/07/security-teams-european-compliance-operations-gap/
-
Cybersecurity hat kein Budget-Problem
Tags: breach, business, ciso, compliance, cyberattack, cybersecurity, cyersecurity, governance, jobs, risk, security-incident, strategyEin Tag im Leben eines Sicherheitsentscheiders”¦Wenn es um Security-Budgets geht, dreht sich ein Großteil der (Online-)Diskussionen darum, wie man das “Board” für sich gewinnt und Investitionen rechtfertigt. Einige Ansätze basieren auf spezifischen Finanzmodellen und zielen darauf ab, den Return on Investment (ROI) zu rechtfertigen. Andere konzentrieren sich eher darauf, Risiken zu quantifizieren und deren Minderung…
-
As Ransomware Attacks Surge, Healthcare Must Look Beyond Compliance to Establish a Cyber Risk Mindset
Tags: attack, compliance, cyber, cybersecurity, data-breach, healthcare, insurance, ransomware, riskThe February 2024 Change Healthcare incident exposed 190 million patient records and disrupted healthcare operations nationwide, but it highlighted something far more concerning: the U.S. healthcare sector faces an unprecedented cybersecurity crisis. Healthcare is now the third most-targeted sector, experiencing a 32% surge in ransomware attacks last year. Cyber insurance claims tied to these incidents..…
-
Why Business Structure Matters for Cybersecurity Compliance in Remote-First Companies
Remote-first companies are no longer an exception. What began as a temporary response to global disruption has evolved into a long-term operating model for startups, scaleups, and even established enterprises. Distributed teams, cloud-based tools, and borderless hiring have unlocked flexibility and talent access”, but they have also introduced new cybersecurity and compliance challenges. One often-overlooked…
-
AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026?
Tags: access, ai, api, application-security, attack, authentication, automation, business, ciso, cloud, compliance, computer, computing, container, control, crypto, cryptography, cyber, cybersecurity, data, data-breach, defense, detection, encryption, exploit, finance, flaw, framework, governance, government, healthcare, iam, identity, infrastructure, injection, LLM, malicious, metric, monitoring, network, nist, open-source, oracle, regulation, resilience, risk, service, skills, software, strategy, supply-chain, threat, tool, vulnerability, vulnerability-management, waf, zero-day, zero-trustAI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026? madhav Tue, 01/06/2026 – 04:44 If we think 2025 has been fast-paced, it’s going to feel like a warm-up for the changes on the horizon in 2026. Every time this year, Thales experts become cybersecurity oracles and predict where the industry is…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
Passwords are still breaking compliance programs
The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/06/passwords-compliance-control/
-
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
Tags: automation, ceo, communications, compliance, control, cyber, cybersecurity, data, detection, email, finance, framework, group, guide, intelligence, law, metric, nist, phishing, ransomware, RedTeam, resilience, risk, tool, updateThe 10 dimensions, translated for cybersecurity: The ORCS framework defines ten dimensions. Treat them as a system. Each one is distinct; together they are complete. Leadership & governance. Leaders set the tone, model the behavior and anchor accountability. If leaders treat cyber as only an IT issue, everyone else will, too. When leaders make risk-informed…
-
California’s DROP Program Changes Everything: How B2C Companies Can Eliminate Authentication Liabilities and Meet Global Privacy Compliance with MojoAuth
California’s DROP Program Changes Everything First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth/
-
California’s DROP Program Changes Everything: How B2C Companies Can Eliminate Authentication Liabilities and Meet Global Privacy Compliance with MojoAuth
California’s DROP Program Changes Everything First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth/

