Tag: risk-management
-
Inside the Updated AI Governance Suite Dashboard – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/inside-the-updated-ai-governance-suite-dashboard-kovrr/
-
Die Risiken steigen schneller als die Schutzmaßnahmen 40 Prozent der Unternehmen überschätzen den Reifegrad ihres Datenschutzes
Viele deutsche Organisationen überschätzen ihren Datenschutz und sind sich der Komplexität moderner Angriffsvektoren sowie der Anforderungen an Compliance oft nicht ausreichend bewusst, was zu gefährlichen Diskrepanzen zwischen Selbstwahrnehmung und tatsächlicher Bedrohungslage führt. Ari Albertini empfiehlt dringend die Automatisierung von Sicherheits- und Compliance-Prozessen, ein aktives Risikomanagement sowie die kritische Prüfung der eingesetzten Software, um europäische Souveränität und…
-
Nachhaltige Innovation treibt KnowBe4 im Markt für Human Risk Management voran
KnowBe4 erlebte ein sehr erfolgreiches Jahr in Bezug auf Auszeichnungen, Wachstum und Innovation. Das Unternehmen sicherte sich höchste Anerkennung in den Bereichen Qualität seiner Cybersicherheitsprodukte, Kundenzufriedenheit und Arbeitsplatzkultur. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/nachhaltige-innovation-treibt-knowbe4-im-markt-fuer-human-risk-management-voran/a43942/
-
Singapore AI Risk Guidelines and Capital Resilience – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/singapore-ai-risk-guidelines-and-capital-resilience-kovrr/
-
Operationalizing Risk: Automating Cyber Risk Processes
<div cla Modern organizations operate in environments where cyber risks evolve daily, cloud infrastructure changes continuously, and compliance expectations intensify across jurisdictions. In this environment, traditional risk management that relies on staticrisk assessments and manual effort is no longer sufficient. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/operationalizing-risk-automating-cyber-risk-processes/
-
OpenClaw Insights: A CISO’s Guide to Safe Autonomous Agents FireTail Blog
Tags: access, ai, api, breach, ciso, compliance, control, data, data-breach, detection, endpoint, finance, firewall, framework, governance, guide, LLM, network, open-source, risk, risk-management, software, strategy, technology, tool, vulnerabilityFeb 27, 2026 – Alan Fagan – The “OpenClaw” crisis has board members asking, “Could this happen to us?” The answer isn’t to ban AI agents. It’s to govern them. By now, the dust is settling on the OpenClaw (aka MoltBot) incident. The technical post-mortems (including our own) have been written, the exposed ports have…
-
AI Risk Management: Process, Frameworks, and 5 Mitigation Methods
Learn how to identify, assess, and mitigate AI risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ai-risk-management-process-frameworks-and-5-mitigation-methods/
-
Microsoft Copilot DLP Bypass: A Data Trust Wake-Up Call for AI Security
Tags: access, ai, business, ciso, cloud, compliance, control, data, data-breach, detection, email, endpoint, infrastructure, leak, microsoft, monitoring, risk, risk-management, saas, toolWhen Microsoft confirmed that a bug allowed Copilot to surface and summarize emails marked confidential despite existing DLP controls, it reignited urgent questions about Microsoft Copilot security, DLP bypass risk and enterprise AI data protection. The reaction was immediate. For many CISOs and security leaders responsible for Microsoft 365 security and AI risk management, it…
-
Autonomer KI-Agent für das Human-Risk-Management
KnowBe4 führt AIDA-Orchestration ein. Dabei handelt es sich um den achten KI-gestützten Agenten in der KnowBe4-Suite, bekannt als AIDA (Artificial-Intelligence-Defense-Agents). Der AIDA-Orchestration-Agent ist ein autonomes, KI-gestütztes System für das Human-Risk-Management. Er erstellt, plant und verwaltet unabhängig personalisierte Phishing-Sicherheitstests und Security-Awareness-Trainings auf Benutzerebene, die sich dynamisch an das Risikoprofil jeder Person anpassen. Dadurch entfallen manuelle Kampagnen,…
-
How Enterprise CISOs Design Their Cyber Risk Management Strategy
Tags: ai, business, ciso, cyber, cybersecurity, finance, regulation, risk, risk-management, strategy<div cla For today’s CISOs, enterprise cyber risk management is no longer a technical exercise. It’s a leadership mandate that sits at the intersection of security, business risk, regulation, and executive accountability. Aligning proactive cybersecurity risk management strategies with the business’s overall risk posture is an ongoing, necessary process. A lack of alignment between cybersecurity…
-
US dominance of agentic AI at the heart of new NIST initiative
Moving too slowly: According to Gary Phipps, head of customer success at agentic AI security startup Helmet Security, a problem with NIST is that its initiatives are being outpaced by real-world developments. “History says that anything NIST comes up with will likely not emerge fast enough to address agentic AI,” said Phipps.”From the time NIST…
-
The Cloud and AI Velocity Trap: Why Governance Is Falling Behind Innovation
Tags: access, ai, attack, business, cloud, compliance, control, cyber, data, flaw, framework, governance, grc, iam, identity, least-privilege, malicious, malware, radius, risk, risk-management, service, supply-chain, tactics, threat, tool, vulnerability, zero-trustAI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities and unmonitored supply chain dependencies leave orgs exposed. We offer 10 tactics to shut down your most critical attack paths. Key takeaways The velocity trap: Security teams are fighting “machine-speed” threats with manual processes; you…
-
The Cloud and AI Velocity Trap: Why Governance Is Falling Behind Innovation
Tags: access, ai, attack, business, cloud, compliance, control, cyber, data, flaw, framework, governance, grc, iam, identity, least-privilege, malicious, malware, radius, risk, risk-management, service, supply-chain, tactics, threat, tool, vulnerability, zero-trustAI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities and unmonitored supply chain dependencies leave orgs exposed. We offer 10 tactics to shut down your most critical attack paths. Key takeaways The velocity trap: Security teams are fighting “machine-speed” threats with manual processes; you…
-
Shadow Machines: The Non-Human Identities Exposing Your Cloud AI Stack
Tags: access, ai, api, authentication, automation, business, cloud, compliance, container, control, credentials, data, encryption, framework, governance, iam, identity, infrastructure, iot, jobs, login, mfa, password, risk, risk-management, saas, service, software, strategy, supply-chain, toolShadow Machines: The Non-Human Identities Exposing Your Cloud & AI Stack madhav Thu, 02/19/2026 – 06:30 The machines we don’t see are the ones running our businesses. Unfortunately, most IAM systems do not track them. In an ironic twist, the ghost in the machine has become the machine itself: invisible, autonomous, and increasingly beyond human…
-
Notepad++ author says fixes make update mechanism ‘effectively unexploitable’
Tags: access, attack, backdoor, china, control, credentials, dns, espionage, exploit, group, infrastructure, intelligence, malicious, monitoring, network, risk, risk-management, service, software, supply-chain, threat, ukraine, update, vulnerabilityCSOonline, Ho said that no system can ever be declared absolutely unbreakable, “but the new design dramatically raises the bar.”An attacker must now compromise both the hosting infrastructure and the signing keys, he explained, adding that the updater now validates both the manifest and the installer, each with independent cryptographic signatures. And any mismatch, missing…
-
Discipline is the new power move in cybersecurity leadership
Tags: automation, cyber, cybersecurity, data, group, incident response, intelligence, metric, risk, risk-management, service, siem, soc, technology, threat, tool, update, vulnerability, vulnerability-managementHow to do more with less: 1. Review contracts, renegotiate them or change the operations to a new partner Scope, service-level agreements and performance metrics should be revisited because many contracts were established under different risk profiles, urgency and pricing conditions. Modernizing contracts to focus on outcomes rather than activities, revalidating pricing and service assumptions…
-
Finding a common language around risk
Tags: ceo, cio, ciso, corporate, cyber, cybersecurity, defense, framework, governance, guide, intelligence, lessons-learned, metric, monitoring, phishing, ransomware, risk, risk-management, service, strategy, supply-chain, technology, threat, tool, training, updateBuilding one culture from three languages: The Organizational Risk Culture Standard (ORCS) offers something most frameworks miss: it treats culture as the foundation, not the afterthought. You can’t bolt culture onto existing processes and call it done. Culture is how people actually think about risk when no one is watching. It’s the shared beliefs that…
-
KnowBe4 Appoints Kelly Morgan as Chief Customer Officer to Drive Global Customer Lifecycle Strategy
KnowBe4 has announced the appointment of Kelly Morgan as its new Chief Customer Officer (CCO), reinforcing the company’s commitment to delivering measurable customer outcomes as it continues to expand in the Human and AI Risk Management market. Morgan will oversee KnowBe4’s global end-to-end customer lifecycle, leading the Customer Success, Customer Support, Managed Services and Professional…
-
Kelly Morgan zum Chief Customer Officer bei KnowBe4 ernannt
Der Anbieter der weltweit renommierten Cybersicherheitsplattform, die sich umfassend mit Risikomanagement für Menschen und KI-Agenten befasst, KnowBe4, gibt heute die Ernennung von Kelly Morgan zum Chief Customer Officer bekannt. Mit seiner Funktion wird Morgan die globale Verantwortung für den gesamten Kundenlebenszyklus übernehmen. Er wird die Bereiche Customer-Success, Customer-Support, Managed-Services und Professional-Services von KnowBe4 leiten. Die…
-
Kelly Morgan zum Chief Customer Officer bei KnowBe4 ernannt
Der Anbieter der weltweit renommierten Cybersicherheitsplattform, die sich umfassend mit Risikomanagement für Menschen und KI-Agenten befasst, KnowBe4, gibt heute die Ernennung von Kelly Morgan zum Chief Customer Officer bekannt. Mit seiner Funktion wird Morgan die globale Verantwortung für den gesamten Kundenlebenszyklus übernehmen. Er wird die Bereiche Customer-Success, Customer-Support, Managed-Services und Professional-Services von KnowBe4 leiten. Die…
-
AI Is Transforming the Chief Data Officer Role
AI Elevates CDO Job From Gatekeeper to Data-Driven Change Agent. The chief data officer is being pushed out of the shadows and into the C-suite spotlight with the rise of AI. While the role emerged as one rooted in compliance and risk management, it has evolved to be a business driver, holding the keys to…
-
Never settle: How CISOs can go beyond compliance standards to better protect their organizations
Tags: ai, awareness, breach, ciso, compliance, computing, control, cybersecurity, finance, risk, risk-assessment, risk-management, software, strategy, threat, training, vulnerabilityThe new North Star for CISOs: Accounting for emerging risk: We’ve established that it’s no longer good enough to overfit into a compliance standard, but you can still use compliance to your advantage.Most compliance programs mandate an information security risk assessment and, at a larger company, you may already have a dedicated enterprise risk management…
-
NIS2: Supply chains as a risk factor
Why supply chains are particularly vulnerable: The supply chain is an attractive target for attackers for several reasons. External partners often have privileged access, work with sensitive data, or are deeply integrated into operational processes. At the same time, they are often not subject to the same security standards as large organizations.Furthermore, there is a structural lack…
-
Top 10 Cyber Risk Management and GRC Companies in the UK and Globally
Cyber risk management and Governance, Risk, and Compliance (GRC) have become central to how organisations protect data, meet regulatory obligations, and maintain operational resilience. As cyber threats grow more sophisticated and regulatory scrutiny increases, organisations must demonstrate not only that risks are identified, but that they are governed, prioritised, and controlled effectively. Cyber risk management…
-
Human risk management: CISOs’ solution to the security awareness training paradox
Tags: access, ai, awareness, ciso, compliance, cyber, cybersecurity, data, email, identity, intelligence, malicious, mitigation, risk, risk-management, strategy, tool, trainingWhat is human risk management?: HRM is defined as a cybersecurity strategy that identifies, measures, and reduces the risks caused by human behavior. Simply stated, security awareness training is about what employees know; HRM is about what they do (i.e., their actual cybersecurity behavior).To be more specific, HRM integrates into email security tools, web gateways,…

