Tag: governance
-
Roses Are Red, AI Is Wild: A Guide to AI Regulation
AI regulation doesn’t have to be romanticized or feared. Understand what matters in AI governance, compliance, and SaaS risk management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/roses-are-red-ai-is-wild-a-guide-to-ai-regulation/
-
Proofpoint Expands AI Security Offerings With Acuvity Acquisition
Proofpoint announced Thursday that it has acquired a startup focused on AI security and governance, Acuvity. First seen on crn.com Jump to article: www.crn.com/news/security/2026/proofpoint-expands-ai-security-offerings-with-acuvity-acquisition
-
Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report
Tags: access, ai, api, attack, automation, business, cloud, container, cyber, cybersecurity, data, exploit, finance, flaw, gartner, governance, identity, intelligence, iot, leak, network, risk, service, technology, threat, tool, update, vulnerability“Tenable’s asset and attack surface coverage, its application of AI and its reputation for vulnerability assessment makes it the front-runner in AI-powered exposure assessment,” Gartner writes in “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.” Key Takeaways from Tenable: This is the latest among a recent string of recognitions Tenable…
-
Omada Identity Governance Bericht zeigt Sicherheitsbedenken bei KI-Agenten
Die Studie verdeutlicht einen Paradigmenwechsel: Identity Governance hat sich längst von einer punktuellen Kontrollaufgabe zum Kernelement für den modernen IT-Betrieb entwickelt. Sie bildet das unverzichtbare Fundament für Zero Trust und KI-gestützte Prozesse in Unternehmen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/omada-identity-governance-bericht-zeigt-sicherheitsbedenken-bei-ki-agenten/a43705/
-
Palo Alto closes privileged access gap with $25B CyberArk acquisition
Tags: access, ai, cloud, control, detection, endpoint, governance, identity, intelligence, microsoft, network, okta, risk, threat, zero-trustCustomer impact and integration risks: While Palo Alto is integrating CyberArk’s capabilities into its security ecosystem, the company will continue to offer CyberArk’s identity security solutions as a standalone platform.This signals continuity and roadmap stability for existing customers in the near term. “Standalone CyberArk availability is expected to continue, now backed by Palo Alto’s global…
-
The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance
Tags: access, automation, cloud, container, credentials, data, framework, github, governance, identity, infrastructure, jobs, network, risk, service, software, toolFigure 1: Governance must move from static reviews to a continuous lifecycle of issuance, verification and automated expiration. Niranjan Kumar Sharma 1. Identity must be cryptographic We must stop relying on IP allowlists. In a world of dynamic containers, network location is a poor proxy for trust.We need to move toward cryptographic identity. Every workload…
-
Hack-Backs: Deutschland plant Cyber-Gegenangriffe
Die Bundesregierung will offensive Cyberoperationen gegen ausländische Angreifer ermöglichen. Das ist ein Paradigmenwechsel in der deutschen Sicherheitspolitik. First seen on golem.de Jump to article: www.golem.de/news/hack-backs-deutschland-plant-cyber-gegenangriffe-2602-205312.html
-
Cloud teams are hitting maturity walls in governance, security, and AI use
Enterprise cloud programs have reached a point where most foundational services are already in place, and the daily work now centers on governance, security enforcement, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/12/enterprise-cloud-governance-gaps-governance-security/
-
Reco Secures $30M as Enterprises Struggle With Governing AI
Series B Funding Targets AI Agent Security Across Hundreds of SaaS Apps. Reco’s $30 million Series B round will fuel expansion of its AI SaaS governance platform as enterprises adopt generative AI at scale. CEO Ofer Klein says traditional security tools can’t keep up with the explosion of AI agents embedded across SaaS environments. First…
-
Single prompt breaks AI safety in 15 major language models
Fundamental changes to safety mechanisms: The research went beyond measuring attack success rates to examine how the technique alters models’ internal safety mechanisms. When Microsoft tested Gemma3-12B-It on 100 diverse prompts, asking the model to rate their harmfulness on a 0-9 scale, the unaligned version systematically assigned lower scores, with mean ratings dropping from 7.97…
-
How to govern agentic AI so as not to lose control
assisting and start acting. We will witness a qualitative leap towards agent-based or agentive AI, capable of making autonomous decisions, managing complex workflows, and executing end-to-end tasks without constant intervention. However, this autonomy carries with it a serious warning for businesses: the ability to operate alone exponentially multiplies the impact of any error or security…
-
OpenClaw integrates VirusTotal malware scanning as security firms flag enterprise risks
Tags: access, ai, api, control, crowdstrike, crypto, cybersecurity, data, data-breach, email, exploit, gartner, github, governance, injection, macOS, malicious, malware, marketplace, network, risk, security-incident, skills, software, threat, tool, virus, vulnerabilityWhat prompted the response: The scanning initiative follows a series of security incidents documented by multiple firms over the past two weeks. Koi Security’s February 1 audit of all 2,857 ClawHub skills discovered 341 malicious ones in a campaign dubbed “ClawHavoc.”The professional-looking skills for cryptocurrency tools and YouTube utilities contained fake prerequisites that installed keyloggers…
-
OpenClaw integrates VirusTotal malware scanning as security firms flag enterprise risks
Tags: access, ai, api, control, crowdstrike, crypto, cybersecurity, data, data-breach, email, exploit, gartner, github, governance, injection, macOS, malicious, malware, marketplace, network, risk, security-incident, skills, software, threat, tool, virus, vulnerabilityWhat prompted the response: The scanning initiative follows a series of security incidents documented by multiple firms over the past two weeks. Koi Security’s February 1 audit of all 2,857 ClawHub skills discovered 341 malicious ones in a campaign dubbed “ClawHavoc.”The professional-looking skills for cryptocurrency tools and YouTube utilities contained fake prerequisites that installed keyloggers…
-
Gartner-Prognose: Die sechs wichtigsten Cybersicherheits-Trends für 2026
Tags: ai, awareness, business, compliance, computing, cyberattack, cybersecurity, cyersecurity, framework, gartner, governance, resilience, risk, soc, tool, trainingLesen Sie, mit welchen Cybersecurity-Trends sich Unternehmen in diesem Jahr beschäftigen sollten.Auch im Jahr 2026 bleibt die Cybersicherheitslage angespannt. Doch was sind die wichtigsten Themen, Risiken und Chancen, mit denen sich Security-Entscheider aktuell befassen sollten?Das Marktforschungsunternehmen Gartner hat dazu folgende sechs Trends ermittelt: KI-Agenten werden zunehmend von Mitarbeitern und Entwicklern genutzt, wodurch neue Angriffsflächen entstehen.…
-
AI agents behave like users, but don’t follow the same rules
Security and governance approaches to autonomous AI agents rely on static credentials, inconsistent controls, and limited visibility. Securing these agents requires the same … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/09/securing-autonomous-ai-agents-rules/
-
Who’s Liable When Embedded AI Goes Wrong?
Privacy Expert Chiara Rustici on Laws Governing Autonomous Robots, Embedded AI. As embedded AI moves from labs into real environments, organizations face growing liability risks. From border patrol robots to healthcare automation, leaders must understand how AI governance, product liability, data protection and security laws apply, said Chief Privacy Officer Chiara Rustici. First seen on…
-
Gartner identifiziert die wichtigsten Cybersicherheitstrends für 2026: Unbekanntes Terrain
Wachsende KI-Verbreitung macht starke Governance unverzichtbar. Der unkontrollierte Vormarsch von künstlicher Intelligenz, geopolitische Spannungen, regulatorische Unsicherheiten und eine sich zuspitzende Bedrohungslage sind laut Gartner die zentralen Treiber der wichtigsten Cybersicherheitstrends für 2026. »Verantwortliche für Cybersicherheit bewegen sich in diesem Jahr auf weitgehend unbekanntem Terrain. Das Zusammenspiel dieser Kräfte stellt die Belastbarkeit ihrer Teams in… First…
-
Amaranth-Dragon Zielgerichtete Cyberspionage gegen Behörden in Südostasien
Check Point Software Technologies hat über die Sicherheitsforscher von Check Point Research (CPR) hochgradig zielgerichtete Cyberspionagekampagnen aufgedeckt. Sie richteten sich im Jahr 2025 gegen Regierungs- und Strafverfolgungsbehörden in der ASEAN-Region. Die Aktivitäten werden einem bislang öffentlich nicht dokumentierten Bedrohungsakteur namens ‘Amaranth-Dragon” zugeschrieben, der eng mit dem chinesisch zugeordneten APT-41-Ökosystem verbunden ist. Die wichtigsten Ergebnisse im…
-
Building trust with the board through evidence-based proof
Tags: backup, business, cio, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, incident, insurance, mitigation, regulation, resilience, risk, strategy, tool, updateBuilding a common language to get to “Here’s the proof of cyber resilience”: CISOs can reframe the discussion using data and evidence. Modern cybersecurity tools produce a large volume of data and information on how they operate at any point in time, the status of controls deployed, the validation of configuration and more. There’s an…
-
1.5 million AI agents are at risk of going rogue
The real issue is invisible AI, not rogue AI: Manish Jain, principal research director at Info-Tech Research Group, said that as the “exponential” speed of AI development continues, his firm, based on experiences with CIOs and CDOs, predicts that there will be more AI agents globally by the year 2028 than the number of human…
-
EIC 2026 – Digitale Identitäten im Spannungsfeld zwischen Governance und KI
First seen on security-insider.de Jump to article: www.security-insider.de/eic-2026-berlin-digitale-identitaeten-governance-ki-post-quanten-cryptography-a-9e0254c82e9586fabb43751511f4d842/
-
How Hospitals’ Use of GenAI is Putting Patients at Risk Without Realizing It
Hospitals are adopting Gen AI across EHR workflows, but hallucinations, bias, and weak governance pose real patient safety risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/how-hospitals-use-of-genai-is-putting-patients-at-risk-without-realizing-it/
-
AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026
Author : Karunakar Goud RGDate Published : February, 04, 2026 AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 Artificial intelligence is no longer experimental. By 2026, AI systems are embedded in customer support, security operations, decision-making, and product development. As AI adoption accelerates, AI governance has become a…The…
-
AI is Supercharging Work…and Your Attack Surface
AI boosts productivity, but weak data governance and shadow AI are expanding the enterprise attack surface. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ai-is-supercharging-work-and-your-attack-surface/
-
AI Governance in Cybersecurity: Building Trust and Resilience in the Age of Intelligent Security
Artificial intelligence is no longer a “nice to have” in cybersecurity it’s embedded everywhere. From detecting suspicious activity to responding to incidents in real time, AI now sits at the heart of modern security operations. But as organizations hand over more responsibility to intelligent systems, a tough question emerges: who’s really in control? This First…
-
Sichere Entwicklung, Bereitstellung und Nutzung von Anwendungen der künstlichen Intelligenz
Zscaler versetzt mit seinen KI-Sicherheitsinnovationen Organisationen in die Lage, die Nutzung von KI zu sichern und gleichzeitig Transparenz, Kontrolle und Governance zu gewährleisten. Da Unternehmen heute generative KI einsetzen und sich auf die Implementierung von agentenbasierter KI vorbereiten, sind sie einem steigenden Risiko von Cyberangriffen und Datenverlusten ausgesetzt, da herkömmliche Sicherheitsmodelle nicht für die Sicherung…

