Tag: strategy
-
Beyond Testing: API Security as the Foundational Intelligence for an ‘industry leader’-Level Security Strategy
Tags: ai, api, application-security, attack, business, ciso, communications, container, data, detection, gartner, governance, intelligence, risk, service, strategy, technology, tool, vulnerabilityIn today’s security landscape, it’s easy to get lost in a sea of acronyms. But one layer has become the undisputed foundation for modern application security: API security. Why? Because APIs are no longer just part of the application, they are the application. They are the connective tissue for microservices, third-party data, and the explosive…
-
AI in Manufacturing: The Growing Risk and Reward Dilemma Escalating Data Security
Explore the challenges and strategies for securing AI integration in manufacturing, focusing on governance, data privacy, and the role of connected worker platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ai-in-manufacturing-the-growing-risk-and-reward-dilemma-escalating-data-security/
-
US cybersecurity weakened by congressional delays despite Plankey renomination
Tags: business, cisa, cyber, cybersecurity, government, infrastructure, law, network, risk, strategy, threatCISA 2015 reauthorization: Likely, but late and suboptimal: A major cybersecurity bill called the Cybersecurity Information Sharing Act of 2015 (CISA 2015), which expired on Sept. 30, was temporarily revived on Nov. 13 and given a two-month lease on life through Jan. 30, 2026. The law provides critical legal liability protections that enable cyber threat…
-
Building a Solid IT Strategy in an Unstable World
Experts on How CIOs Can Avoid ‘Geopolitical Lock-In’ in AI, Cloud and Supply Chains. Geopolitical instability is a part of reality in 2026, and the stakes are high for CIOs who must rely on global supply chains to develop IT, artificial intelligence, cloud and cybersecurity strategies. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/building-solid-strategy-in-unstable-world-a-30512
-
Distology boss looking for strong 2026
Tags: strategySecurity distributor has signed Tenable as part of its ongoing growth strategy First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366637275/Distology-boss-looking-for-strong-2026
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
RBAC vs ReBAC: Comparing Role-Based Relationship-Based Access Control
Deep dive into RBAC vs ReBAC for enterprise sso. Learn which authorization model fits your ciam strategy and how to avoid role explosion in complex apps. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/rbac-vs-rebac-comparing-role-based-relationship-based-access-control/
-
Der EU AI Act Wenn Compliance zur KI-Strategie wird
Der EU AI Act erfordert eine systematische Auseinandersetzung mit KI im Unternehmen von der Inventarisierung über die Risikobewertung bis zur technischen Dokumentation. Unternehmen, die heute beginnen, verschaffen sich zeitliche Puffer für Iterationen und organisatorisches Lernen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/der-eu-ai-act-wenn-compliance-zur-ki-strategie-wird/a43340/
-
ITStrategie für komplexe Landschaften entwickeln
»Eine IT-Security-Strategie für komplexe Landschaften zu entwickeln, sollte zu Jahresbeginn ganz oben auf der Agenda stehen.« Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier……
-
Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
Public sector cybersecurity faces outdated systems, budget gaps, and rising attacks. Learn key challenges, defense strategies, and proven best practices. First seen on hackread.com Jump to article: hackread.com/cybersecurity-public-sector-challenges-strategies-practices/
-
Tenable Is a Gartner® Peer Insights Customers’ Choice for Cloud-Native Application Protection Platforms
Tags: ai, api, attack, automation, banking, ciso, cloud, compliance, control, cybersecurity, data, detection, gartner, google, governance, healthcare, identity, infrastructure, microsoft, risk, risk-management, service, software, strategy, technology, tool, vulnerability, vulnerability-managementThis recognition, based entirely on feedback from the people who use our products every day, to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helping organizations worldwide, across all industry sectors, preemptively close critical…
-
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
Tags: access, ai, application-security, backdoor, ciso, cloud, cyber, cyberattack, data, github, Hardware, infrastructure, kritis, kubernetes, LLM, monitoring, network, nis-2, programming, resilience, risk, rust, sbom, software, spyware, strategy, supply-chain, tool, vulnerabilityEgal, ob React2Shell, Shai-Hulud oder XZ Utils: Die Sicherheit der Software-Supply-Chain wird durch zahlreiche Risiken gefährdet.Heutige Anwendungen basieren auf zahlreichen Komponenten, von denen jede zusammen mit den Entwicklungsumgebungen selbst eine Angriffsfläche darstellt. Unabhängig davon, ob Unternehmen Code intern entwickeln oder sich auf Drittanbieter verlassen, sollten CISOs, Sicherheitsexperten und Entwickler der Software-Supply-Chain besondere Aufmerksamkeit schenken.Zu den…
-
‘Index Digitale Souveränität” von Adesso – Digitale Souveränität: Vier von fünf Unternehmen sind ohne Strategie
Tags: strategyFirst seen on security-insider.de Jump to article: www.security-insider.de/digitale-souveraenitaet-vier-von-fuenf-unternehmen-sind-ohne-strategie-a-fc6f36192c1127560dc8d61f1d0d13ad/
-
How protected are your secrets in hybrid environments?
Are Your Machine Identities Secure in Hybrid Environments? Managing Non-Human Identities (NHIs) is becoming a crucial aspect of cybersecurity strategies, particularly in hybrid environments. But what are NHIs, and why should they matter to organizations operating in diverse sectors such as financial services, healthcare, and travel, particularly those utilizing cloud technology? Understanding Non-Human Identities and……
-
What makes an NHI management strategy scalable?
Tags: strategyWhat Is Driving the Need for a Scalable NHI Management Strategy? Is your organization grappling with the complexities of managing Non-Human Identities (NHIs)? With digital transformation continues to redefine operational, the management of machine identities becomes a pivotal concern across industries. NHIs, which are essentially machine identities, serve as the linchpin in ensuring robust cybersecurity……
-
How do NHIs empower secure cloud environments?
How Can Non-Human Identities Transform Secure Cloud Environments? What underpins a robust cloud security strategy when it comes to machine identities? Managing Non-Human Identities (NHIs) has emerged as a critical linchpin for organizations across various industries. From financial services to healthcare, and from DevOps to Security Operations Centers (SOC), understanding and harnessing NHIs can revolutionize……
-
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go through all 5 pillars aka readiness dimensions and see what we can actually do to make your SOC AI-ready. #1 SOC Data Foundations As I said before, this one is my…
-
Agentic AI requires rethink of cloud security strategy
Security leaders discuss the rise of agentic AI, warning that autonomous agents operating at machine speed will require organisations to move away from static protection towards behavioural monitoring and automated reasoning First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637022/Agentic-AI-requires-rethink-of-cloud-security-strategy
-
AI Deception Is Here: What Security Teams Must Do Now
Recent research shows that deception can emerge instrumentally in goal-directed AI agents. This means deception can arise as a side effect of goal-seeking, persisting even after safety training and often surfacing in multi-agent settings. In controlled studies, systems like Meta’s CICERO demonstrated the capacity to use persuasion and, at times, misleading strategies in order to..…
-
CISA flags max-severity bug in HPE OneView amid active exploitation
Tags: api, authentication, cisa, endpoint, exploit, flaw, Hardware, intelligence, kev, monitoring, software, strategy, threat, update, vulnerabilityNot an ‘apply and move on’ solution: While CISA’s KEV inclusion raised the priority immediately, enterprises can’t treat OneView like a routine endpoint patch. Management-plane software is often deployed on-premises, sometimes on physical servers, and tightly coupled with production workflows. A rushed fix that breaks monitoring, authentication, or integrations can be almost as dangerous as…
-
Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)
As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than evidence. The real challenge isn’t a lack of forecasts”, it’s identifying which predictions reflect real, emerging risks and which can safely be ignored.An upcoming webinar hosted by Bitdefender aims to cut through the noise…
-
Campaigners urge UK to develop digital sovereignty strategy
UK digital rights campaigners have urged UK parliamentarians to implement a digital sovereignty strategy as part of the forthcoming Cybersecurity and Resilience Bill to reduce reliance on technology subject to foreign interference First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637125/Campaigners-urge-UK-to-develop-digital-sovereignty-strategy
-
Like it or not, AI will transform cyber strategy in 2026
Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637095/Like-it-or-not-AI-will-transform-cyber-strategy-in-2026
-
Relevante Cybersecurity-Entwicklungen 2026
Welche Entwicklungen sind 2026 in puncto Cybersicherheit relevant und worauf müssen sich Unternehmen, Management und Sicherheitsteams einstellen? Nick Schneider, President und CEO von Arctic Wolf, gibt einen Ausblick auf die für Wirtschaft und Gesellschaft wichtigsten Cybersicherheit-Entwicklungen im neuen Jahr. Markt und Strategie Im Jahr 2026 wird KI der Treiber für eine umfassende Marktkonsolidierung sein. Die […]…

