Tag: governance
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
Dutch government puts Nexperia on a short leash over chip security fears
Minister invokes powers to stop firm shifting knowledge to China, citing governance shortcomings First seen on theregister.com Jump to article: www.theregister.com/2025/10/13/nexperia_special_measures/
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Tags: access, advisory, ai, attack, authentication, breach, business, ciso, cloud, computing, credentials, cve, cyber, cybersecurity, data, defense, endpoint, exploit, extortion, finance, framework, fraud, google, governance, guide, hacker, hacking, identity, incident response, Internet, iot, jobs, login, microsoft, monitoring, network, nist, oracle, organized, password, privacy, ransomware, risk, risk-assessment, risk-management, scam, skills, technology, threat, tool, training, update, vulnerability, vulnerability-management, zero-dayWant recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud. Key takeaways Eager to…
-
FBI seizes BreachForums servers as threatened Salesforce data release deadline approaches
Tags: attack, dark-web, data, detection, extortion, governance, infrastructure, intelligence, leak, least-privilege, radius, ransomware, risk, saas, serviceTargeting SaaS: Rik Ferguson, VP security intelligence at Forescout, agreed that any disruption was likely to be a temporary setback.”It burns infrastructure, yields intelligence, and sows distrust among criminals. But the gang’s dark-web leak site is still up, and they explicitly say the campaign continues,” he told CSO Online by email.”That tells you everything about…
-
Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native Application Protection Platforms (CNAPP), is proud to announce that Nanoprecise has selected AccuKnox to enhance its cloud security, governance, and compliance framework. Nanoprecise is a pioneer predictive maintenance and condition monitoring, and leverages Artificial Intelligence and IoT technologies to deliver…
-
Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native Application Protection Platforms (CNAPP), is proud to announce that Nanoprecise has selected AccuKnox to enhance its cloud security, governance, and compliance framework. Nanoprecise is a pioneer predictive maintenance and condition monitoring, and leverages Artificial Intelligence and IoT technologies to deliver…
-
Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native Application Protection Platforms (CNAPP), is proud to announce that Nanoprecise has selected AccuKnox to enhance its cloud security, governance, and compliance framework. Nanoprecise is a pioneer predictive maintenance and condition monitoring, and leverages Artificial Intelligence and IoT technologies to deliver…
-
The CIA triad is dead, stop using a Cold War relic to fight 21st century threats
Tags: ai, backup, breach, business, ceo, ciso, compliance, csf, cyber, cybersecurity, data, data-breach, deep-fake, firewall, framework, fraud, GDPR, governance, infrastructure, ISO-27001, nist, privacy, ransomware, regulation, resilience, sbom, software, supply-chain, technology, threat, zero-trustRansomware is not just an availability problem. Treating ransomware as a simple “availability” failure misses the point. Being “up” or “down” is irrelevant when your systems are locked and business halted. What matters is resilience: the engineered ability to absorb damage, fail gracefully, and restore from immutable backups. Availability is binary; resilience is survival. Without…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Your cyber risk problem isn’t tech, it’s architecture
Tags: ai, attack, awareness, best-practice, business, ciso, cloud, compliance, container, control, csf, cyber, cybersecurity, data, data-breach, defense, finance, framework, GDPR, governance, grc, group, intelligence, Internet, ISO-27001, mitre, nist, PCI, phishing, privacy, ransomware, regulation, risk, risk-assessment, risk-management, software, strategy, threat, training, update, vulnerabilityIf the company already has a mature risk culture: The implementation of a cybersecurity management project becomes more flexible. Since my goal is to share the mechanics to achieve success in a cybersecurity program, I emphasize below some components of this ‘recipe’ to consider: Understand the dynamics and scope of the business, mapping stakeholders, processes…
-
Your cyber risk problem isn’t tech, it’s architecture
Tags: ai, attack, awareness, best-practice, business, ciso, cloud, compliance, container, control, csf, cyber, cybersecurity, data, data-breach, defense, finance, framework, GDPR, governance, grc, group, intelligence, Internet, ISO-27001, mitre, nist, PCI, phishing, privacy, ransomware, regulation, risk, risk-assessment, risk-management, software, strategy, threat, training, update, vulnerabilityIf the company already has a mature risk culture: The implementation of a cybersecurity management project becomes more flexible. Since my goal is to share the mechanics to achieve success in a cybersecurity program, I emphasize below some components of this ‘recipe’ to consider: Understand the dynamics and scope of the business, mapping stakeholders, processes…
-
Datenschutzkonferenz-Entschließung: Datenschutzbeauftragte fordern Nein der Bundesregierung zur Chat-Kontrolle
Tags: governanceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/datenschutzkonferenz-entschliessung-datenschutzbeauftragte-forderung-nein-bundesregierung-chat-kontrolle
-
Keine Mehrheit: EU-Verhandlungen zu Chatkontrolle wieder gescheitert
Tags: governanceMit dem Nein der Bundesregierung gibt es keine Mehrheit für die Chatkontrolle auf EU-Ebene. Die nächste Verhandlungsrunde könnte im Dezember folgen. First seen on golem.de Jump to article: www.golem.de/news/keine-mehrheit-eu-verhandlungen-zu-chatkontrolle-vorerst-gescheitert-2510-200965.html
-
Wendung bei Chatkontrolle – Deutschland kann sich nicht auf Zustimmung einigen
Überraschende Wende bei der Chatkontrolle: Entgegen bisheriger Annahmen konnte sich die Bundesregierung bei dieser auf keine Linie einigen. First seen on computerbase.de Jump to article: www.computerbase.de/news/netzpolitik/wendung-bei-chatkontrolle-deutschland-kann-sich-nicht-auf-zustimmung-einigen.94592
-
Wendung bei Chatkontrolle – Deutschland kann sich nicht auf Zustimmung einigen
Überraschende Wende bei der Chatkontrolle: Entgegen bisheriger Annahmen konnte sich die Bundesregierung bei dieser auf keine Linie einigen. First seen on computerbase.de Jump to article: www.computerbase.de/news/netzpolitik/wendung-bei-chatkontrolle-deutschland-kann-sich-nicht-auf-zustimmung-einigen.94592
-
USENIX 2025: PEPR ’25 Panel: How Privacy Engineers Can Shape The Coming Wave Of AI Governance
Moderator, Panelists: Moderator – Zachary Kilhoffer, Dynatrace; Panelists: Hoang Bao, Axon; Masooda Bashir, University of Illinois at Urbana-Champaign; Debra Farber, Lumin Digital; Sarah Lewis Cortes, Netflix and NIST; Akhilesh Srivastava, IOPD Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com…
-
Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep
Tags: access, attack, breach, cloud, compliance, control, data, exploit, governance, iam, identity, international, Internet, kubernetes, least-privilege, mfa, risk, service, software, technology, threat, tool, vulnerabilityCloud security teams are often blind to one of the biggest threats to cloud environments: a web of over-privileged identities that create pathways for attackers. Learn how to regain control of your cloud identities by automating the enforcement of least privilege across your environment. Key takeaways The gradual accumulation of excessive and unused cloud permissions,…

