Tag: governance
-
Snyk Launches Agent Security Solution and Ships Evo AI-SPM at RSAC 2026
Snyk launched its Agent Security solution and announced the general availability of Evo AI-SPM at RSAC 2026, targeting what it describes as a growing governance gap in enterprise AI agent deployments. The company’s position: autonomous coding agents like Claude Code, Cursor, and Devin are being deployed at machine speed, and most organizations have no security..…
-
Rubrik Launches SAGE to Govern AI Agents in Real Time
Rubrik has unveiled SAGE, the Semantic AI Governance Engine, at RSAC 2026 in San Francisco. The company is positioning it as the first AI governance engine purpose-built to secure and control autonomous agents in real time. SAGE powers Rubrik Agent Cloud, replacing manual, rules-based oversight with intent-driven governance. The core problem SAGE addresses is a..…
-
Purple Book Community and ArmorCode Survey Flags Shadow AI, AI-Generated Code Risks
RSAC 2026 coverage: The Purple Book Community (PBC), in partnership with ArmorCode, released its State of AI Risk Management 2026 report on Monday, based on a survey of more than 650 senior enterprise cybersecurity leaders in North America and Europe. The report points to a governance gap as organizations operationalize AI faster than security programs..…
-
The hidden cost of AI speed: Unmanaged cyber risk
Tags: access, ai, attack, business, chatgpt, ciso, cloud, control, cyber, cybersecurity, data, data-breach, exploit, flaw, google, governance, identity, infrastructure, injection, intelligence, monitoring, open-source, openai, privacy, radius, risk, service, software, threat, tool, vulnerabilityAI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities and their ramifications throughout their IT environments in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management. Key takeaways AI as an attack vector: By connecting to core workflows and…
-
SentinelOne Announces AI Agent Security, Red Teaming, and Auto Investigation GA at RSAC 2026
SentinelOne used RSAC 2026 to push deeper into AI-native security, announcing four new offerings that extend its platform from threat detection into the governance and testing of AI systems themselves. The first is Prompt AI Agent Security, a real-time discovery and governance control plane built for AI agents and agentic workflows. It monitors and enforces..…
-
73% of Breaches Happen Due to Weak GRC Implement It The Right Way
Most organizations assume breaches happen because of sophisticated zero-day exploits or highly advanced attackers. The reality is far less dramatic and far more risky. Nearly 73% of breaches stem from weak Governance, Risk, and Compliance (GRC) practices. This means attackers are not breaking in, they’re walking through open doors created by poor risk visibility, weak……
-
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident
Cursor’s Composer 2 identified as Moonshot’s Kimi K2.5 exposing an AI governance gap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/moonshot-ai-governance-breakdown-lessons-from-the-cursor-kimi-k2-5-incident/
-
Chainguard Assemble 2026 and the Security Factory Mindset
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/chainguard-assemble-2026-and-the-security-factory-mindset/
-
Chainguard Assemble 2026 and the Security Factory Mindset
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/chainguard-assemble-2026-and-the-security-factory-mindset/
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
Identity-Centric Security Strategies for Hybrid Workforces
In the hybrid work era, 80% of breaches stem from compromised credentials. Explore why identity-centric security and Zero Trust are now the “only perimeter that matters,” and learn practical strategies for IAM, MFA, and automated governance to secure your modern workforce. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/identity-centric-security-strategies-for-hybrid-workforces/
-
5 key priorities for your RSAC 2026 agenda
Tags: ai, api, attack, automation, ciso, compliance, conference, cybersecurity, data, detection, framework, governance, identity, infrastructure, injection, LLM, risk, service, soc, threat, tool, trainingEnable AI adoption fast enough to stay competitive.Secure the enterprise against a threat landscape that AI itself is creating.These are not sequential problems, unfortunately; they are parallel ones. I’d argue that RSAC 2026 is your best opportunity this year as a security leader to close the knowledge gap. AI prioritised Learning Framework: RSAC can be…
-
Fake-ITler: Nordkoreanische IT-Agenten machen 500 Millionen USD
Fake-ITler aus Nordkorea erwirtschaften für ihre Regierung im Jahr 500 Millionen US-Dollar. Unternehmen können auf Warnzeichen achten. First seen on golem.de Jump to article: www.golem.de/news/fake-itler-nordkoreanische-it-agenten-machen-500-millionen-usd-2603-206680.html
-
How to scale code review when AI writes code faster than you can understand it
AI-generated code is growing faster than humans can review it. See how automated code review and governance protect code quality and application security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/how-to-scale-code-review-when-ai-writes-code-faster-than-you-can-understand-it/
-
Top 10 Governance, Risk Compliance (GRC) Tools in 2026
Discover the top governance, risk and compliance (GRC) tools in 2026. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/grc-tools/
-
Enterprise AI Agent Governance: A Layered Approach (Build, Deployment and Runtime)
Emerging Governance Challenges As organizations implement AI agents on a large scale, they are likely to encounter governance challenges. The current focus in AI security primarily centers on several key concerns: prompt injection, model misuse, and unsafe responses. These issues reflect the immediate risks that enterprises must address as they deploy AI agents, highlighting the……
-
AI Governance Starts With Access, Not Models – SaaS + AI
AI risk isn’t about models alone. Learn why SaaS + AI governance depends on access, OAuth, and integrations”, and how to move from chaos to control. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-governance-starts-with-access-not-models-saas-ai/
-
Can you prove the person on the other side is real?
Tags: access, ai, business, control, credentials, exploit, governance, identity, least-privilege, risk, threat, tool, updateExploiting the deceased and the dormant: Attackers follow leverage. Dormant, legacy and deceased identities create leverage because they already come with history, which serves as scaffolding for a synthetic persona to climb.I have seen how quickly a subdued record can become an entry point. An adversary pairs an older account or identity footprint with newly…
-
Cybersecurity and privacy priorities for 2026: The legal risk map
Tags: attack, authentication, awareness, best-practice, breach, communications, country, cyber, cybersecurity, data, defense, finance, fraud, governance, government, incident, incident response, infrastructure, law, mfa, monitoring, privacy, ransomware, regulation, risk, risk-management, service, strategy, supply-chain, threat, usaContinued federal interest in cybersecurity and privacy, especially in connection with national security concerns: The evident connection between cybersecurity and privacy and national security have led to a number of federal initiatives in recent years. Most recently in March 2026, the White House announced the current administration’s Cyber Strategy for America, renewing a commitment to…
-
Es fehlen Grundlagen, um KI sicher in Finanzprozesse zu integrieren
Gleichzeitig mit wachsendem KI”‘Einsatz im Finanzbereich fehlen vielen Organisationen weiterhin die operativen Grundlagen für eine sichere Integration. Eine aktuelle Studie zeigt, dass selbst KI”‘Vorreiter häufig an Governance, Datenmanagement und Infrastruktur scheitern. Damit bleibt der Schritt vom Experiment zur skalierbaren Anwendung in zentralen Finanzprozessen für viele Unternehmen eine Herausforderung. Laut einer Studie von Payhawk fehlt… First…
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…

