Tag: governance
-
One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security
Alisa Viejo, United States, January 20th, 2026, CyberNewsWire One Identity, a trusted leader in identity security, today announces a major upgrade to One Identity Manager, a top-rated IGA solution, strengthening identity governance as a critical security control for modern enterprise environments. One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and…
-
Thales named Growth Index leader in Frost Radar: Data Security Platforms Report
Tags: access, ai, business, cloud, compliance, container, control, data, defense, detection, edr, encryption, endpoint, governance, identity, intelligence, LLM, monitoring, risk, saas, service, siem, soc, technology, toolThales named Growth Index leader in Frost Radar: Data Security Platforms Report madhav Tue, 01/20/2026 – 04:29 Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The…
-
Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says
Gartner predicts 50% of organizations will adopt zero trust data governance by 2028 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-model-collapse-zero-trust-data/
-
From arts degree to cybersecurity: Rona Michele Spiegel brings fresh perspective to cyber leadership
Tags: ai, awareness, business, cisco, ciso, cloud, compliance, computer, cyber, cybersecurity, data, governance, group, hacking, Hardware, intelligence, jobs, network, office, penetration-testing, privacy, psychology, risk, risk-management, skills, software, startup, strategy, supply-chain, technology, tool, vulnerabilityRona Michele Spiegel’s journey to cybersecurity might seem unconventional to some: She studied the arts. But as someone who grew up when computers first appeared and everyone wanted to experiment with them, she did a lot of multimedia work. She was always interested in technology and discussed with art colleagues about where the world was…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…
-
Building a scalable approach to PII protection within AI governance frameworks
Learn how to scale PII protection within your AI governance framework using automated detection, data masking, and access controls”, without sacrificing speed or data utility. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/building-a-scalable-approach-to-pii-protection-within-ai-governance-frameworks/
-
Insider risk in an age of workforce volatility
Tags: access, ai, api, authentication, automation, backdoor, backup, china, ciso, control, credentials, cyber, cybersecurity, data, data-breach, exploit, framework, governance, government, identity, jobs, least-privilege, malicious, mitigation, monitoring, network, risk, strategy, supply-chain, threat, zero-trustEarly warnings: The machine as insider risk/threat: These dynamics are not emerging in a vacuum. They represent the culmination of warnings that have been building for years.As early as 2021, in my CSO opinion piece “Device identity: The overlooked insider threat,” Rajan Koo (then chief customer officer at DTEX Systems, now CTO) observed: “There needs…
-
Healthcare’s blind spot: What happens after our data is shared?
A recent healthcare lawsuit exposes how data governance breaks down once records leave the EHR, highlighting the risks of unstructured text in an AI-driven ecosystem. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/healthcares-blind-spot-what-happens-after-our-data-is-shared/
-
CISA Issues New AI Security Guidance for Critical Infrastructure
CISA and international partners issued new guidance on securing AI in operational technology, warning of OT risks and urging stronger governance and safeguards. The post CISA Issues New AI Security Guidance for Critical Infrastructure appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cisa-ai-security-guidance-2026/
-
KI-gestützte Governance – Vom regulatorischen Labyrinth zur praktikablen Compliance
First seen on security-insider.de Jump to article: www.security-insider.de/ki-unternehmen-governance-a-e1facfd75fdbbf8b4412f664bf69c913/
-
Beyond Testing: API Security as the Foundational Intelligence for an ‘industry leader’-Level Security Strategy
Tags: ai, api, application-security, attack, business, ciso, communications, container, data, detection, gartner, governance, intelligence, risk, service, strategy, technology, tool, vulnerabilityIn today’s security landscape, it’s easy to get lost in a sea of acronyms. But one layer has become the undisputed foundation for modern application security: API security. Why? Because APIs are no longer just part of the application, they are the application. They are the connective tissue for microservices, third-party data, and the explosive…
-
AI in Manufacturing: The Growing Risk and Reward Dilemma Escalating Data Security
Explore the challenges and strategies for securing AI integration in manufacturing, focusing on governance, data privacy, and the role of connected worker platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ai-in-manufacturing-the-growing-risk-and-reward-dilemma-escalating-data-security/
-
CISO Assistant: Open-source cybersecurity management and GRC
CISO Assistant is an open-source governance, risk, and compliance (GRC) platform designed to help security teams document risks, controls, and framework alignment in a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/14/ciso-assistant-open-source-cybersecurity-management-grc/
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
Dark Patterns, Children’s Data and Corporate Fiduciary Risk
How UX Decisions Are Becoming Regulatory Liabilities for CISOs Children’s data is entering a new regulatory era where dark patterns, defaults and monetization choices can signal breached fiduciary duty. As privacy, safety and consumer laws converge globally, CISOs must treat manipulative UX, consent flows and retention practices as core security and governance risks. First seen…
-
Email is Not Legacy. It’s Infrastructure.
Discover why business email remains mission-critical infrastructure, and how governance, automation, and AI integration future-proof it. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/email-is-not-legacy-its-infrastructure/
-
The Top Security, Risk, and AI Governance Frameworks for 2026
<div cla By 2026, cybersecurity programs will no longer be evaluated on how many frameworks they “support,” but on whether they can produce defensible decisions at the business’s operating speed. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/the-top-security-risk-and-ai-governance-frameworks-for-2026/
-
Palo Alto Networks Introduces New Vibe Coding Security Governance Framework
Researchers at Palo Alto’s Unit 42 have outlined a list of recommended security controls for vibe coding tools First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/palo-alto-networks-vibe-coding/
-
Tenable Is a Gartner® Peer Insights Customers’ Choice for Cloud-Native Application Protection Platforms
Tags: ai, api, attack, automation, banking, ciso, cloud, compliance, control, cybersecurity, data, detection, gartner, google, governance, healthcare, identity, infrastructure, microsoft, risk, risk-management, service, software, strategy, technology, tool, vulnerability, vulnerability-managementThis recognition, based entirely on feedback from the people who use our products every day, to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helping organizations worldwide, across all industry sectors, preemptively close critical…
-
What Enterprises Need in AI Governance Software – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/what-enterprises-need-in-ai-governance-software-kovrr/
-
Predict 2026: AI, Trust and the Security Reckoning Ahead
Join us at Predict 2026 to understand how AI transforms security, governance, and risk management, preparing leaders for the rapidly evolving landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/predict-2026-ai-trust-and-the-security-reckoning-ahead/
-
Unlock remote work’s GRC impact: Challenges to opportunities
As organizations worldwide recalibrate their operations in the wake of unprecedented change, remote work has emerged not simply as a fleeting trend but as a mainstay of modern business. For compliance experts and leaders alike, this shift has introduced a complex interplay of governance, risk management, and compliance (GRC) challenges and opportunities. This article explores…The…
-
Healthcare Chatbots Provoke Unease in AI Governance Analysts
AI Failures May Hide in Ways that Safety Tests Don’t Measure. When an AI chatbot tells people to add glue to pizza, the error is obvious. When it recommends eating more bananas – sound nutritional advice that could be dangerous for someone with kidney failure – the mistake hides in plain sight. First seen on…
-
What AI Agents Can Teach Us About NHI Governance
Agentic AI is a stress test for non-human identity governance. Discover how and why identity, trust, and access control must evolve to keep automation safe. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/what-ai-agents-can-teach-us-about-nhi-governance/
-
Like it or not, AI will transform cyber strategy in 2026
Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637095/Like-it-or-not-AI-will-transform-cyber-strategy-in-2026
-
Enterprises still aren’t getting IAM right
Tags: access, ai, api, authentication, automation, cloud, control, credentials, cybersecurity, data, email, governance, iam, identity, incident response, infrastructure, least-privilege, password, risk, saas, service, toolJust 1% have fully implemented a modern just-in-time (JIT) privileged access model;91% say at least half of their privileged access is always-on (standard privilege), providing unrestricted, persistent access to sensitive systems;45% apply the same privileged access controls to human and AI identities;33% lack clear AI access policies.The research also revealed a growing issue with “shadow…
-
ChatGPT Health: Top Privacy, Security, Governance Concerns
OpenAI: Tool Will ‘Securely’ Connect With Medical Records, But How Will That Work?. OpenAI is rolling out a new version of ChatGPT dedicated to health that the company said will also securely connect users’ medical records and wellness apps to better personalize responses. OpenAI says more than 230 million people each week ask ChatGPT wellness…
-
AI and the Future of Work: 5 Predictions for 2026
Experts predict 2026 will bring less AI hype and more governance, delayed enterprise spending, AI moving into OT, smarter cyberattacks, and faster cooling tech. The post AI and the Future of Work: 5 Predictions for 2026 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-ai-predictions-2026-future-of-work/

