Tag: governance
-
Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep
Tags: access, attack, breach, cloud, compliance, control, data, exploit, governance, iam, identity, international, Internet, kubernetes, least-privilege, mfa, risk, service, software, technology, threat, tool, vulnerabilityCloud security teams are often blind to one of the biggest threats to cloud environments: a web of over-privileged identities that create pathways for attackers. Learn how to regain control of your cloud identities by automating the enforcement of least privilege across your environment. Key takeaways The gradual accumulation of excessive and unused cloud permissions,…
-
Droht Deutschlands Zustimmung zur Chatkontrolle, die Verschlüsselung digitaler Kommunikation zu gefährden?
Seit 1999 hat die deutsche Regierung konsequent anerkannt, dass Verschlüsselung zentral für die wirtschaftliche, digitale und innere Sicherheit Deutschlands und der EU ist. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/droht-deutschlands-zustimmung-zur-chatkontrolle-die-verschluesselung-digitaler-kommunikation-zu-gefaehrden/a42272/
-
Is the CISO chair becoming a revolving door?
Tags: ai, automation, breach, business, ciso, cloud, control, cybersecurity, framework, governance, jobs, risk, skills, threatIs the stress worth the sacrifice?: For others in the CISO role, including Fullpath CISO Shahar Geiger Maor, the issue is less about boredom and more about the constant strain. “At any time there may be a breach. You live under the assumption that something is going to go wrong, and it’s very stressful,” he…
-
DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It
DevOpsDays Philadelphia 2025 showed how AI governance, secrets security, runtime traces, and ablative resilience work together to reduce operational risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/devops-days-philadelphia-2025-security-as-a-control-loop-resilience-runtime-risks-and-how-ai-is-changing-it/
-
IT leaders need to prepare for GenAI legal issues
GenAI is being embedded into enterprise software. This has implications for governance and regulatory compliance First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632394/Gartner-IT-leaders-need-to-prepare-for-GenAI-legal-issues
-
Back-up fehlt: Feuer zerstört ungesicherte Cloud der koreanischen Regierung
750.000 Beamte haben ihre Dateien in dem zerstörten Cloud-System abgelegt. Das war aber nicht an ein Back-up angeschlossen – ein fataler Fehler. First seen on golem.de Jump to article: www.golem.de/news/back-up-fehlt-feuer-zerstoert-ungesicherte-cloud-der-koreanischen-regierung-2510-200813.html
-
CISOs rethink the security organization for the AI era
Jill Knesek, CISO, BlackLine BlackLineEchoing Oleksak, Knesek says she feels strongly about utilizing traditional security and having the right controls in place. Getting foundational security right will get you a long way, she says.’Then, as you learn about more sophisticated attacks “¦ we’ll have to pivot our tooling and capabilities to those risks.” For now,…
-
CISOs rethink the security organization for the AI era
Jill Knesek, CISO, BlackLine BlackLineEchoing Oleksak, Knesek says she feels strongly about utilizing traditional security and having the right controls in place. Getting foundational security right will get you a long way, she says.’Then, as you learn about more sophisticated attacks “¦ we’ll have to pivot our tooling and capabilities to those risks.” For now,…
-
Modernisierungsagenda der Bundesregierung: DsiN begrüßt wichtiges Signal und fordert Taten
Tags: governanceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/modernisierungsagenda-bundesregierung-dsin-begruessung-wichtigkeit-signal-forderung-taten
-
Italy’s AI Law Comes Into Force
On October 10, 2025, Italy will become the first EU member state to bring a national artificial intelligence law into force, moving ahead of the bloc’s landmark EU AI Act. Law No. 132 of 2025, published in the Gazzetta Ufficiale in late September, positions Italy at the center of Europe’s evolving AI governance landscape. The……
-
Italy’s AI Law Comes Into Force
On October 10, 2025, Italy will become the first EU member state to bring a national artificial intelligence law into force, moving ahead of the bloc’s landmark EU AI Act. Law No. 132 of 2025, published in the Gazzetta Ufficiale in late September, positions Italy at the center of Europe’s evolving AI governance landscape. The……
-
Descope Gets $35M for AI Agent Identity Controls, Governance
Identity Security Vendor to Expand AI Governance Tools Including MCP Server Defense. Descope raised $35 million to expand its agentic identity hub and MCP authorization capabilities. As enterprises adopt AI, CISOs demand granular governance, auditing and secure identity frameworks for nonhuman agents. Descope aims to lead this emerging space. First seen on govinfosecurity.com Jump to…
-
Descope Gets $35M for AI Agent Identity Controls, Governance
Identity Security Vendor to Expand AI Governance Tools Including MCP Server Defense. Descope raised $35 million to expand its agentic identity hub and MCP authorization capabilities. As enterprises adopt AI, CISOs demand granular governance, auditing and secure identity frameworks for nonhuman agents. Descope aims to lead this emerging space. First seen on govinfosecurity.com Jump to…
-
Strategic Intelligence From the Cybersecurity Front Lines
The 2025 Cybersecurity Pulse Report: Advanced Threat Research Edition. The Cybersecurity Pulse Report: 2025 Edition delivers the latest frontline intelligence, capturing the critical threats, innovations and governance debates shaping today’s security agenda. Synthesized through ISMG’s AI-powered tools, the report covers resilience, innovation and competition. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/strategic-intelligence-from-cybersecurity-front-lines-a-29618
-
Netskope CEO: Going Public Fuels AI Security, Partner Growth
Sanjay Beri Touts IPO as Catalyst for Trust, Brand Awareness, Key to Cloud Success. CEO Sanjay Beri says Netskope’s IPO helps it compete with longtime rivals by boosting visibility and access. By combining deep R&D, partner support and AI governance, the firm aims to accelerate adoption of secure cloud and AI capabilities across global customers.…
-
Sichere Bewältigung von Compliance-Herausforderungen bei der Datenaufbewahrung durch SaaS-Drittlösungen
Die Einhaltung von Richtlinien zur Datenaufbewahrung sind für Unternehmen unerlässlich, denn sie sorgen dafür, dass wertvolle Informationen sicher gespeichert und Branchenvorschriften egal wie komplex sie sind eingehalten werden. Diese Governance-Frameworks legen fest, wie Unternehmen sensible Daten verwalten von deren Erstellung und aktiven Nutzung bis hin zur Archivierung oder Vernichtung. Heute verlassen sich […] First seen…
-
Introducing Resource Policies for Continuous AI Security FireTail Blog
Sep 30, 2025 – Alan Fagan – AI moves fast. New models are adopted, get updated, configurations drift. Keeping track of it all is hard, and catching security issues before they become incidents can feel impossible.That is why, as part of our latest release, we’ve added Resource Policies to FireTail.Resource Policies make it simple to…
-
Databricks enters the cybersecurity arena with an AI-driven platform
A crowded field of AI Security Platforms: Databricks’ latest move puts it in competition with established security players who’ve been leaning heavily on AI-driven analytics, including Splunk (now part of Cisco), Microsoft Sentinel, Google Chronicle, and startups like Securonix. Each offers some flavors of unifying data streams, layering AI detection, and reducing analyst fatigue.For Databricks,…
-
KI-Gefahren rücken Integritätsschutz in den Mittelpunkt
Tags: ai, ciso, cloud, compliance, cyberattack, data, data-breach, DSGVO, exploit, governance, injection, LLM, ml, risk, tool, training, updateData Poisoning gefährdet die Integrität von KI-Modellen.Für CISOs reduziert KI selten die Komplexität, sondern füllt vielmehr ihre ohnehin schon volle Agenda. Neben den traditionellen Sicherheitsprioritäten müssen sie sich nun auch mit neuen KI-bedingten Risiken auseinandersetzen, etwa wenn KI-Lösungen unkontrolliert für geschäftliche Zwecke genutzt, Modelle manipuliert und neue Vorschriften nicht eingehalten werden. Eine der drängendsten Herausforderungen…
-
Ukraine’s digital chief pushes for AI-first state amid war and cyber threats
Ukraine’s deputy prime minister is betting big on artificial intelligence’s ability to shape governance, education and even the battlefield. First seen on therecord.media Jump to article: therecord.media/ukraine-ai-state-digital
-
How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM
Let’s have a look at how to integrate NHI Governance with AWS IAM to get detailed security insights into your dashboard. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/how-to-use-nhi-governance-as-your-central-dashboard-to-monitor-aws-iam/
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies
Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-using-privacy-infrastructure-to-kickstart-ai-governance-nist-ai-risk-management-case-studies/
-
Qantas cutting CEO pay signals new era of cyber accountability
Tags: ai, attack, breach, ceo, ciso, cyber, cybersecurity, data, data-breach, finance, governance, incident, incident response, malicious, privacy, ransomware, riskWhat should CISOs and CEOs do now?: CISOs, who have historically borne the brunt of breaches and malicious cyber incidents, should take heed of this emerging trend. “Be aware of the environment and expectations today, and where they’re headed,” Redgraves’ Tully says. “Try to get out in front of that. You need to work with…
-
Cyberangriff: Britischer CoGruppe entgeht Millionengewinn
Eine Cyberattacke im April 2025 hat bei der Co-op-Gruppe zu großen Verlusten geführt.Die britische Verbrauchergenossenschaft Co-op rechnet wegen einer Cyberattacke mit entgangenen Gewinnen in Höhe von etwa 120 Millionen Pfund (rund 137 Millionen Euro) im laufenden Geschäftsjahr. Das geht aus dem jüngsten Halbjahresbericht der Co-operative Group hervor, die vor allem Supermärkte in Großbritannien betreibt, unter…
-
Cyberangriff: Britischer CoGruppe entgeht Millionengewinn
Eine Cyberattacke im April 2025 hat bei der Co-op-Gruppe zu großen Verlusten geführt.Die britische Verbrauchergenossenschaft Co-op rechnet wegen einer Cyberattacke mit entgangenen Gewinnen in Höhe von etwa 120 Millionen Pfund (rund 137 Millionen Euro) im laufenden Geschäftsjahr. Das geht aus dem jüngsten Halbjahresbericht der Co-operative Group hervor, die vor allem Supermärkte in Großbritannien betreibt, unter…
-
Cloud Security Alliance launches framework to improve SaaS security
Tags: access, business, ceo, cloud, compliance, control, firewall, framework, governance, international, Internet, monitoring, network, privacy, risk, risk-assessment, saas, zero-trustChange control and configuration managementData security and privacy lifecycle managementIdentity and access managementInteroperability and portabilityLogging and monitoringSecurity incident management, e-discovery, and cloud forensicsThese domains are designed to map high-level business requirements into tangible SaaS security features that customers can actually configure and rely on, such as log delivery, SSO enforcement, secure configuration guidelines, and incident…
-
AI coding assistants amplify deeper cybersecurity risks
Tags: access, ai, api, application-security, attack, authentication, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, data-breach, detection, fintech, flaw, governance, injection, leak, LLM, metric, open-source, programming, radius, risk, risk-management, service, software, startup, strategy, threat, tool, training, vulnerability‘Shadow’ engineers and vibe coding compound risks: Ashwin Mithra, global head of information security at continuous software development firm Cloudbees, notes that part of the problem is that non-technical teams are using AI to build apps, scripts, and dashboards.”These shadow engineers don’t realize they’re part of the software development life cycle, and often bypass critical…

