Tag: resilience
-
Security Is Shifting From Prevention to Resilience
Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset toward resilience and response. Cole traces his career from the early days of mass malware outbreaks like Melissa and ILOVEYOU through today’s environment of nation-state actors, AI-assisted attacks, and sprawling hybrid workforces. While the tools..…
-
AI Governance in Cybersecurity: Building Trust and Resilience in the Age of Intelligent Security
Artificial intelligence is no longer a “nice to have” in cybersecurity it’s embedded everywhere. From detecting suspicious activity to responding to incidents in real time, AI now sits at the heart of modern security operations. But as organizations hand over more responsibility to intelligent systems, a tough question emerges: who’s really in control? This First…
-
Digitale Zwillinge als wichtige Bausteine moderner OT-Resilienz
Neben kontinuierlichem Exposure-Management braucht operative Resilienz in OT-Umgebungen konkrete technische und organisatorische Hebel: Zugangskontrollen, belastbare Testumgebungen und kompensierende Maßnahmen für Legacy-Systeme. Gleichzeitig rückt die Lieferkette als Angriffs- und Compliance-Faktor in den Mittelpunkt. Zugriffe managen und das Prinzip der minimalen Privilegien Eine zentrale Säule der modernen OT-Resilienz im Jahr 2026 ist die Durchsetzung des Zugriffs mit…
-
Outages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard.
Tags: access, ai, attack, breach, business, cloud, compliance, computing, container, control, csf, cyberattack, data, defense, detection, dora, encryption, finance, framework, government, nist, regulation, resilience, service, software, strategy, technologyOutages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard. madhav Tue, 02/03/2026 – 05:21 No company is spared the pain of outages. But their impact can be mitigated by how resilient you build your business architecture. And who you choose to partner with can significantly determine how effective that will be.…
-
IT Security
In a world where businesses are built on digital infrastructure, IT security has become a critical pillar of organizational resilience and trust. From cloud computing and remote workforces to SaaS applications and connected devices, modern IT environments are larger, more complex, and more exposed than ever before. At the same time, cyber threats are growing…
-
How risk culture turns cyber teams predictive
Tags: access, compliance, control, credentials, cyber, cybersecurity, data-breach, detection, identity, intelligence, jobs, ransomware, resilience, risk, serviceRisk culture: What it is when you strip the slogans: People talk about culture like it’s soft. Posters. Values. A town hall with applause on cue.Culture is harder. Culture is what people do when nobody is watching, and when the clock is loud. Culture is what gets you the truth at 4 p.m., not at…
-
Das nächste große Security-Schlachtfeld
Tags: ai, chatgpt, computer, computing, cyber, cybersecurity, cyersecurity, encryption, framework, governance, Hardware, resilience, training, usaWenn Quantum Computing und KI in der Praxis zusammenkommen, bricht ein neues Zeitalter an auch und vor allem in Sachen Cybersecurity.In den letzten Jahren hat künstliche Intelligenz (KI) ihre Tentakel über die globale Technologielandschaft ausgebreitet. Das verdeutlicht unter anderem auch der zunehmende Einsatz von Automatisierung und autonomen Technologien in diversen Branchen und Sektoren. Und während…
-
QA: Why Cybersecurity Is Now a Core Business Risk, Not Just a Technical Problem
Tags: attack, business, cyber, cybersecurity, data, government, infrastructure, resilience, risk, supply-chain, threatCybersecurity threats are escalating in scale and sophistication, and organisations around the world are scrambling to keep pace with the evolving digital risk landscape. Governments and corporations alike face increasing pressure to strengthen cyber resilience as attacks extend across critical infrastructure, supply chains and data systems with growing frequency. At the forefront of national and…
-
A practical take on cyber resilience for CISOs
In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wealth Business Banking at Standard Chartered, explains how security leaders should think … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/29/cyber-resilience-strategy-video/
-
Smarter Security, Smaller Teams: Building Resilience with Limited Resources
Security teams are being asked to manage enterprise-scale threats with fewer tools, fewer analysts, and tighter budgets. Discover how high-performing SOCs are building clarity-driven, resilience-focused programs that scale without alert overload, burnout, or runaway complexity. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/security/smarter-security-smaller-teams-building-resilience-with-limited-resources/
-
AHA Releases New Guides to Strengthen Hospital Emergency and Cyber Preparedness
Healthcare organizations in the United States face threats, ranging from public health emergencies to cyberattacks. To support hospitals and health systems in enhancing their preparedness and resilience, the American Hospital Association (AHA) has released two comprehensive resources for cyber preparedness in healthcare. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cyber-preparedness-in-healthcare/
-
Delegation is a risk decision every leader makes, not an ops choice
Tags: access, ai, awareness, breach, business, communications, compliance, control, finance, governance, infrastructure, jobs, resilience, risk, risk-assessment, service, toolAirlines and booking platforms, overwhelmed by volume and operational pressure, delegated financial decision-making to automated systems that could issue credits, delay refunds, or apply preset rules at scale.In many cases, those systems operated exactly as configured. They stayed within internal thresholds, followed approved logic, and reduced immediate operational load. The problem surfaced later. Customers challenged outcomes.…
-
Skills CISOs need to master in 2026
Tags: access, ai, business, ciso, cloud, compliance, credentials, cyber, cybersecurity, data, endpoint, finance, firewall, group, Hardware, identity, infrastructure, intelligence, jobs, resilience, risk, risk-management, skills, strategy, threat, tool, trainingTop technical skills: In addition to strong knowledge of AI systems, today’s CISOs need a solid foundation in the technologies that define modern enterprise environments. The (ISC)² CISSP is still widely regarded as the gold standard for broad expertise in security architecture, risk management, and governance. “Regulators will expect this, and it still appears in…
-
Datenschutz im KI-Zeitalter: Von der Compliance-Pflicht zur strategischen Security-Governance
Datenschutz ist zu einem zentralen Faktor für IT-Sicherheit, digitale Resilienz und unternehmerisches Vertrauen geworden. Angesichts der immer leistungsfähigeren KI-System werden auch die datenschutzrechtlichen und sicherheitsstrategischen Herausforderungen immer größer. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/datenschutz-im-ki-zeitalter-von-der-compliance-pflicht-zur-strategischen-security-governance/a43465/
-
4 issues holding back CISOs’ security agendas
Tags: access, ai, application-security, attack, business, ciso, cloud, compliance, control, cyber, cybersecurity, data, endpoint, framework, governance, intelligence, jobs, monitoring, network, resilience, risk, risk-assessment, risk-management, sans, service, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-management2. Inability to keep pace with AI innovation and adoption: Executives and employees alike have been rushing to adopt artificial intelligence, enticed by expectations that AI will transform workflows and save time, money, and effort.But CISOs for the most part have not kept pace with their business colleagues’ rate of AI adoption.According to a survey…
-
5 cybersecurity trends to watch in 2026
Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/5-cybersecurity-trends-2026/810354/
-
The New Rules of Cyber Resilience in an AI-Driven Threat Landscape
For years, cybersecurity strategy revolved around a simple goal: keep attackers out. That mindset no longer matches reality. Today’s threat landscape assumes compromise. Adversaries do not just encrypt data and demand payment. They exfiltrate it, resell it, reuse it, and weaponize it long after the initial breach. As we look toward 2026, cyber resilience, not..…
-
From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience
When ransomware cripples a business’s systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable, Cybersecurity Ventures estimates ransomware damage costs $156 million per day. But businesses cannot let speed overshadow the more pressing need to understand exactly what happened,.. First…
-
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
Tags: access, ai, compliance, cyberattack, cybersecurity, data, fraud, governance, identity, infrastructure, mail, nis-2, phishing, resilience, risk, risk-analysis, risk-management, security-incident, threat, tool, vulnerability48 Prozent der Fälle von Datendiebstahl, Industriespionage oder Sabotage in Unternehmen gehen laut einer Studie auf Mitarbeiter zurück.Was wäre, wenn das größte Sicherheitsrisiko Ihrer Organisation bereits einen Mitarbeitendenausweis besitzt, legitim angemeldet ist und genau weiß, wie interne Prozesse funktionieren? Diese Frage ist unbequem, aber sie markiert den Ausgangspunkt für eine längst überfällige Auseinandersetzung mit Insider-Bedrohungen.…
-
1. Jahrestag im Kontext Digitaler Operationaler Resilienz
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/dora-1-jahrestag-kontext-digital-operational-resilienz
-
Boards Focus On Risk, Resilience, and Operational Realities: Where NHI Governance Fits In
Learn how GitGuardian helps boards and CISOs align on cyber risk, operational resilience, and the rising impact of unmanaged workload identities at scale. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/boards-focus-on-risk-resilience-and-operational-realities-where-nhi-governance-fits-in/
-
Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
Tags: access, attack, ciso, cloud, compliance, computing, container, control, data, defense, dora, email, encryption, GDPR, google, Hardware, healthcare, identity, infrastructure, law, malware, network, privacy, regulation, resilience, risk, service, software, strategy, zero-trustSecuring the Future: Practical Approaches to Digital Sovereignty in Google Workspace madhav Thu, 01/22/2026 – 04:35 In today’s rapidly evolving digital landscape, data privacy and sovereignty have become top priorities for organizations worldwide. With the proliferation of cloud services and the tightening of global data protection regulations, security professionals face mounting pressure to ensure their…
-
EU tightens cybersecurity rules for tech supply chains
The European Commission has proposed a new cybersecurity package aimed at strengthening the EU’s cyber resilience, including a revised EU Cybersecurity Act designed to secure … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/21/eu-cybersecurity-act-revised/
-
Mehr Sicherheit und bessere Governance für Microsoft-365-Tenants
Coreview bietet mit Tenant-Resilience und Tenant-Management ab sofort zwei neue Lösungen für den Schutz und das Management von Microsoft-365-Tenants über seine Coreview-One-Plattform an. Bei fast zwei Dritteln (63 %) der Microsoft-365-Tenants wird der Least-Privilege-Ansatz nicht umgesetzt. Gleichzeitig meldet Microsoft zunehmende Manipulationen von Konfigurationen bei Identitäts- und Gerätemanagementdiensten. Vor diesem Hintergrund gewinnt der Schutz und die…
-
What a Year of DORA Reveals About Cyber Resilience
<div cla It’s now been a full calendar year since the European Union’s Digital Operational Resilience Act (DORA) became enforceable in January 2025, marking a clear shift in how regulators expect organizations to manage digital risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/what-a-year-of-dora-reveals-about-cyber-resilience/
-
The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience
In Star Trek, the Kobayashi Maru simulation is an unwinnable test faced by Starfleet cadet captains. The only way to “win” is to accept that you can’t. It’s a test of character, forcing cadet captains to choose between impossible options and live with the consequences. In many ways, our roles as cybersecurity leaders is the..…
-
Warum Harmonisierung, Interoperabilität und Resilienz im Mittelpunkt des überarbeiteten EU-Cybersicherheitsgesetzes stehen sollten
Brüssel stellt demnächst die Vorlage des überarbeiteten EU-Cybersicherheitsgesetzes vor. Damit bietet sich die Chance für stärkere Grundlagen und ein ehrgeizigeres Gesetz, das sich auf Interoperabilität konzentriert und die Cyberresilienz in der gesamten EU verbessert. Die Cybersicherheitsbranche hat seit der Verabschiedung des Gesetzes im Jahr 2019 enorme Veränderungen durchlaufen. Der weit verbreitete Einsatz von generativer KI…

