Tag: governance
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
AI Takes Center Stage at RSAC Conference 2026
Real-World Deployment Shift, Governance and AI Investment Pressures a Focus at RSAC. Artificial intelligence dominated Day 1 of RSAC 2026, as security leaders shifted from experimentation to the hard realities of deploying and scaling AI in real-time production environments, facing investment risk and agent setbacks along the way, reports ISMG editors Mathew Schwartz and Michael…
-
Securden Unveils Unified Identity Security Platform at RSAC 2026, Combining PAM, EPM, IGA, and More
Securden launched what it calls the world’s first truly unified identity security platform at RSA Conference 2026, consolidating privileged access management, endpoint privilege management, identity governance, cloud entitlement management, non-human identity security, and AI agent security into a single product. The announcement targets a persistent problem in enterprise security: organizations typically address these identity security..…
-
Tanium Adds AI Governance, OT Endpoint Support, and Closed-Loop Remediation at RSAC 2026
Tanium used RSAC 2026 to announce a wave of platform updates aimed at pushing enterprises closer to fully autonomous IT operations. The new capabilities span security operations, exposure management, and endpoint management, and they lean heavily on AI and real-time endpoint intelligence. The headlining addition is Tanium Guardian Spotlight: AI Tools, which gives IT and..…
-
Why AI Adoption Starts With Security
Meerah Rajavel of Palo Alto Networks on AI Security, Governance and Use-Case Fit. As AI outpaces governance and security frameworks, enterprise leaders face a more pressing question: How can they move fast without losing control? Meerah Rajavel of Palo Alto Networks says organizations need security guardrails, clear use cases and firm limits on probabilistic AI.…
-
Why AI Adoption Starts With Security
Meerah Rajavel of Palo Alto Networks on AI Security, Governance and Use-Case Fit. As AI outpaces governance and security frameworks, enterprise leaders face a more pressing question: How can they move fast without losing control? Meerah Rajavel of Palo Alto Networks says organizations need security guardrails, clear use cases and firm limits on probabilistic AI.…
-
AI Forces CISOs to Rebuild Defense Playbooks
Francis deSouza of Google Cloud on Fighting AI-Driven Threats With AI. AI has redrawn the threat landscape for security leaders and forced a new operating model. Francis deSouza of Google Cloud says CISOs must counter faster, AI-driven attacks with AI-led defense, stronger governance and teams fluent in AI. First seen on govinfosecurity.com Jump to article:…
-
Omada Identity ernennt Jakob H. Kraglund zum neuen CEO
Omada Identity, ein weltweit führender Anbieter von KI-gestützter Identitätssicherheit und -Governance, gab die Ernennung von Jakob H. Kraglund zum Chief Executive Officer (CEO) bekannt. Kraglund kommt mit einer beachtlichen Erfolgsbilanz in den Bereichen Wachstum und digitale Transformation zu Omada Identity. Zuletzt war er CEO bei Targit, ebenfalls einem Unternehmen im Portfolio von GRO, das kürzlich…
-
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business You deployed an AI tool to screen job applicants six months ago. Maybe you used ChatGPT to draft customer communications. Perhaps your product team quietly integrated a third-party AI into your SaaS platform. Each of these decisions, made quickly, in the…The…
-
AI agent discovery: Inventory and govern shadow AI agents – Nudge Security
Discover AI agents your employees build. Get complete inventory, risk insights, and governance across enterprise platforms with Nudge Security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-agent-discovery-inventory-and-govern-shadow-ai-agents-nudge-security/
-
Data Readiness: Fehlender Datenzugriff bremst datengestützte Initiativen aus
Zwei Drittel nennen Infrastruktur-Performanceprobleme als häufiges Hindernis. Die Hälfte nennen KI als Hauptgrund für neue Governance-Aktivitäten. Verzögerter Datenzugriff und geringe Datenqualität schmälern ROI. 90,4 Prozent der deutschen IT-Entscheider können nicht auf alle Daten zugreifen, die sie für ihre datengestützten Initiativen benötigen mit direkten Folgen für datenbasierte Projekte, KI und Kapitalrendite. Obwohl deutsche Unternehmen… First…
-
Snyk Launches Agent Security Solution and Ships Evo AI-SPM at RSAC 2026
Snyk launched its Agent Security solution and announced the general availability of Evo AI-SPM at RSAC 2026, targeting what it describes as a growing governance gap in enterprise AI agent deployments. The company’s position: autonomous coding agents like Claude Code, Cursor, and Devin are being deployed at machine speed, and most organizations have no security..…
-
Rubrik Launches SAGE to Govern AI Agents in Real Time
Rubrik has unveiled SAGE, the Semantic AI Governance Engine, at RSAC 2026 in San Francisco. The company is positioning it as the first AI governance engine purpose-built to secure and control autonomous agents in real time. SAGE powers Rubrik Agent Cloud, replacing manual, rules-based oversight with intent-driven governance. The core problem SAGE addresses is a..…
-
SentinelOne Announces AI Agent Security, Red Teaming, and Auto Investigation GA at RSAC 2026
SentinelOne used RSAC 2026 to push deeper into AI-native security, announcing four new offerings that extend its platform from threat detection into the governance and testing of AI systems themselves. The first is Prompt AI Agent Security, a real-time discovery and governance control plane built for AI agents and agentic workflows. It monitors and enforces..…
-
Purple Book Community and ArmorCode Survey Flags Shadow AI, AI-Generated Code Risks
RSAC 2026 coverage: The Purple Book Community (PBC), in partnership with ArmorCode, released its State of AI Risk Management 2026 report on Monday, based on a survey of more than 650 senior enterprise cybersecurity leaders in North America and Europe. The report points to a governance gap as organizations operationalize AI faster than security programs..…
-
The hidden cost of AI speed: Unmanaged cyber risk
Tags: access, ai, attack, business, chatgpt, ciso, cloud, control, cyber, cybersecurity, data, data-breach, exploit, flaw, google, governance, identity, infrastructure, injection, intelligence, monitoring, open-source, openai, privacy, radius, risk, service, software, threat, tool, vulnerabilityAI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities and their ramifications throughout their IT environments in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management. Key takeaways AI as an attack vector: By connecting to core workflows and…
-
73% of Breaches Happen Due to Weak GRC Implement It The Right Way
Most organizations assume breaches happen because of sophisticated zero-day exploits or highly advanced attackers. The reality is far less dramatic and far more risky. Nearly 73% of breaches stem from weak Governance, Risk, and Compliance (GRC) practices. This means attackers are not breaking in, they’re walking through open doors created by poor risk visibility, weak……
-
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident
Cursor’s Composer 2 identified as Moonshot’s Kimi K2.5 exposing an AI governance gap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/moonshot-ai-governance-breakdown-lessons-from-the-cursor-kimi-k2-5-incident/
-
Chainguard Assemble 2026 and the Security Factory Mindset
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/chainguard-assemble-2026-and-the-security-factory-mindset/
-
Chainguard Assemble 2026 and the Security Factory Mindset
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/chainguard-assemble-2026-and-the-security-factory-mindset/
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Anton’s Security Blog Quarterly Q1 2026
Tags: ai, automation, breach, ciso, cloud, control, defense, detection, framework, google, governance, infrastructure, mandiant, metric, RedTeam, risk, service, siem, soc, software, supply-chain, threat, update, vulnerability, vulnerability-managementMy Anton’s Security Blog (And Podcast!) Quarterly this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify, now with VIDEO). Gemini image for this Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”,…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…
-
Jeremy Snyder talks AI Governance on Security Weekly FireTail Blog
Tags: ai, api, attack, data, GDPR, governance, monitoring, privacy, saas, threat, tool, vulnerabilityMar 19, 2026 – Lina Romero – The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and BYOD took years, AI has integrated into the enterprise in months, often moving faster than security teams can track.”Jeremy joined the Security Weekly team to talk about AI governance…

