Tag: governance
-
Privacy Is Fueling the CIO’s AI Agenda
Cisco Research Shows How AI Is Reshaping Data Privacy and Governance. Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/privacy-fueling-cios-ai-agenda-a-30610
-
4 Probleme, die CISOs behindern
Tags: ai, business, ciso, cloud, compliance, cyberattack, cybersecurity, cyersecurity, data, framework, governance, risk, risk-management, skills, strategy, tool, vulnerability-managementLesen Sie, welche strategischen Probleme CISOs bei ihren Aufgaben behindern.Viele Sicherheitsverantwortliche glauben, dass ein Cybervorfall unvermeidlich ist unklsar ist lediglich der Zeitpunkt. Diese Überzeugung spiegelt sich in der gängigen Redewendung wider, dass es nicht darum geht, ‘ob”, sondern ‘wann” ein Angriff erfolgt.Eine wachsende Zahl von CISOs rechnet jedoch eher früher als später mit einem Vorfall:…
-
Keeper Security Expands Its Zero-Trust Privileged Access Controls Into Slack
Keeper Security’s new Slack integration extends secure, policy-driven access governance into the platform. Slack serves as one of the most popular and widely used collaboration platforms in the world for organisations of all sizes. It has a strong adoption across EMEA, especially in the European markets including the UK, with high engagement across major hubs…
-
Overcoming AI fatigue
Tags: access, ai, awareness, business, ciso, cloud, control, data, finance, governance, incident response, jobs, metric, monitoring, privacy, risk, strategy, supply-chain, technology, tool, training, zero-trustbefore it becomes fully entrenched in every corner of the business. It’s a rare opportunity, one we shouldn’t waste. A big part of the confusion comes from the word “AI” itself. We use the same label to talk about a chatbot drafting marketing copy and autonomous agents that generate and implement incident response playbooks. Technically,…
-
Datenschutz im KI-Zeitalter: Von der Compliance-Pflicht zur strategischen Security-Governance
Datenschutz ist zu einem zentralen Faktor für IT-Sicherheit, digitale Resilienz und unternehmerisches Vertrauen geworden. Angesichts der immer leistungsfähigeren KI-System werden auch die datenschutzrechtlichen und sicherheitsstrategischen Herausforderungen immer größer. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/datenschutz-im-ki-zeitalter-von-der-compliance-pflicht-zur-strategischen-security-governance/a43465/
-
4 issues holding back CISOs’ security agendas
Tags: access, ai, application-security, attack, business, ciso, cloud, compliance, control, cyber, cybersecurity, data, endpoint, framework, governance, intelligence, jobs, monitoring, network, resilience, risk, risk-assessment, risk-management, sans, service, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-management2. Inability to keep pace with AI innovation and adoption: Executives and employees alike have been rushing to adopt artificial intelligence, enticed by expectations that AI will transform workflows and save time, money, and effort.But CISOs for the most part have not kept pace with their business colleagues’ rate of AI adoption.According to a survey…
-
The 7 Essential Elements of a Compliance Framework You Need to Know
Key Takeaways Regulatory expectations continue to expand. Oversight bodies increasingly look beyond documentation to how organizations manage compliance risk in practice. In this environment, compliance functions best when supported by a structured framework. While industries and jurisdictions vary, effective, high-quality governance and compliance programs consistently rely on seven foundational elements. From Requirement Lists to Operating……
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
F5 Strengthens, Scales Sustains AI Security With Integrated Runtime Protection
F5 AI Guardrails and F5 AI Red Team extend platform capabilities with continuous testing, adaptive governance and real-time protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection/
-
F5 Strengthens, Scales Sustains AI Security With Integrated Runtime Protection
F5 AI Guardrails and F5 AI Red Team extend platform capabilities with continuous testing, adaptive governance and real-time protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection/
-
F5 Strengthens, Scales Sustains AI Security With Integrated Runtime Protection
F5 AI Guardrails and F5 AI Red Team extend platform capabilities with continuous testing, adaptive governance and real-time protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection/
-
Dobrindt zu Cyberangriffen: “Wir werden zurückschlagen”
Innenminister Dobrindt will, dass Behörden offensiver gegen Cyberattacken vorgehen können.Die Bundesregierung will auf Cyberangriffe künftig offensiver reagieren. “Wir werden zurückschlagen, auch im Ausland. Wir werden Angreifer stören und ihre Infrastruktur zerstören”, sagte Bundesinnenminister Alexander Dobrindt (CSU) der «Süddeutschen Zeitung». Deutschland werde die Schwelle für solche Schritte niedrig ansetzen.Verantwortlich für solche Gegenschläge sollen laut Dobrindt Geheimdienste…
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
As Oracle loses interest in MySQL, devs mull future options
As Big Red’s governance of the popular database comes into question, contributors to MySQL consider wresting control First seen on theregister.com Jump to article: www.theregister.com/2026/01/23/mysql_post_oracle/
-
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
Tags: access, ai, compliance, cyberattack, cybersecurity, data, fraud, governance, identity, infrastructure, mail, nis-2, phishing, resilience, risk, risk-analysis, risk-management, security-incident, threat, tool, vulnerability48 Prozent der Fälle von Datendiebstahl, Industriespionage oder Sabotage in Unternehmen gehen laut einer Studie auf Mitarbeiter zurück.Was wäre, wenn das größte Sicherheitsrisiko Ihrer Organisation bereits einen Mitarbeitendenausweis besitzt, legitim angemeldet ist und genau weiß, wie interne Prozesse funktionieren? Diese Frage ist unbequem, aber sie markiert den Ausgangspunkt für eine längst überfällige Auseinandersetzung mit Insider-Bedrohungen.…
-
Singapore debuts world’s first governance framework for agentic AI
The Infocomm Media Development Authority has released a guide to help enterprises deploy AI agents safely and address specific risks such as unauthorised actions and automation bias First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637674/Singapore-debuts-worlds-first-governance-framework-for-agentic-AI
-
HHS Watchdog Urges Cyber Governance Overhaul
OIG: Gaps in Standards, Third-Party Oversight Put Agencies, Health Sector at Risk. Auditors say the U.S. Department of Health and Human Services should buttress its ability to respond to cyberthreats by standardizing governance and controls across its many divisions – and also do a better job of overseeing its many contractors and the risk they…
-
From the Data Lake to the Edge: Why Universal Visibility is the Future of API Security
If you look at an enterprise architecture diagram from five years ago, it looks relatively tidy. You had a data center, maybe a cloud provider, and a few gateways. Today, that diagram looks like a constellation. Data is living in AI platforms like Databricks. Frontend applications are pushed to the edge on Netlify. Logic is…
-
Boards Focus On Risk, Resilience, and Operational Realities: Where NHI Governance Fits In
Learn how GitGuardian helps boards and CISOs align on cyber risk, operational resilience, and the rising impact of unmanaged workload identities at scale. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/boards-focus-on-risk-resilience-and-operational-realities-where-nhi-governance-fits-in/
-
Securing Banking Enterprises as Non-Human Identities Grow
CISOs Grapple With AI Blind Spots, Excessive Permissions and Governance Issues. Machine identities continue to multiply as organizations push automation, cloud services and AI-driven initiatives deeper into core operations. This rapid growth creates new vulnerabilities, especially when non-human identities lack governance or are completely invisible to security teams. First seen on govinfosecurity.com Jump to article:…
-
KI als Zensurwerkzeug: Russland will noch härter gegen VPN-Anbieter durchgreifen
Die russische Regierung investiert mehr als zwei Milliarden Rubel in den Kampf gegen VPN-Anbieter. KI soll künftig bei der Blockade helfen. First seen on golem.de Jump to article: www.golem.de/news/investition-in-zensurapparat-russland-will-mit-ki-jagd-auf-vpn-traffic-machen-2601-204455.html
-
Mehr Sicherheit und bessere Governance für Microsoft-365-Tenants
Coreview bietet mit Tenant-Resilience und Tenant-Management ab sofort zwei neue Lösungen für den Schutz und das Management von Microsoft-365-Tenants über seine Coreview-One-Plattform an. Bei fast zwei Dritteln (63 %) der Microsoft-365-Tenants wird der Least-Privilege-Ansatz nicht umgesetzt. Gleichzeitig meldet Microsoft zunehmende Manipulationen von Konfigurationen bei Identitäts- und Gerätemanagementdiensten. Vor diesem Hintergrund gewinnt der Schutz und die…
-
Investition in KI-Tools: Russland will noch härter gegen VPN-Anbieter durchgreifen
Die russische Regierung investiert mehr als zwei Milliarden Rubel in den Kampf gegen VPN-Anbieter. KI soll künftig bei der Blockade helfen. First seen on golem.de Jump to article: www.golem.de/news/investition-in-zensurapparat-russland-will-mit-ki-jagd-auf-vpn-traffic-machen-2601-204455.html
-
Investition in Zensurapparat: Russland will mit KI Jagd auf VPN-Traffic machen
Die russische Regierung investiert mehr als zwei Milliarden Rubel in den Kampf gegen VPN-Anbieter. KI soll künftig bei der Blockade helfen. First seen on golem.de Jump to article: www.golem.de/news/investition-in-zensurapparat-russland-will-mit-ki-jagd-auf-vpn-traffic-machen-2601-204455.html
-
AI slop pushes data governance towards zero-trust models
Organisations are beginning to implement zero-trust models for data governance thanks to the proliferation of poor quality AI-generated data, often known as AI slop. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637476/AI-slop-pushes-data-governance-towards-zero-trust-models
-
NIST’s Blueprint for AI Security: How Data Trust Enables AI Success
Tags: access, ai, attack, automation, business, cloud, compliance, control, csf, cybersecurity, data, endpoint, exploit, framework, governance, guide, intelligence, least-privilege, nist, risk, risk-management, saas, toolThe rapid adoption of artificial intelligence has forced organizations to confront a hard truth: AI changes the cybersecurity equation. New attack surfaces, new misuse patterns and new forms of automation require a different approach to managing risk. That’s why NIST has stepped forward. Through its draft AI cybersecurity profile, NIST CSF 2.0 and the AI…

