Tag: strategy
-
A 5-step approach to taming shadow AI
Tags: ai, api, business, communications, compliance, control, data, defense, finance, framework, governance, incident response, monitoring, network, nist, risk, risk-assessment, risk-management, service, strategy, technology, toolthought work happened and how it actually does today.Here’s a five-step approach to put a robust AI-risk management framework in place: Employees often use public model APIs, browser-based prompt tools and unsanctioned or ungoverned internal chatbots to boost productivity without considering the risk of exposing sensitive data.AI usage is not difficult to identify; you just need…
-
CSO Awards 2026 celebrates world-class security strategies
4Wall Entertainment HMSA Aaron’s LLC Horizon BCBSNJ Accenture K&N Engineering Inc Adobe LyondellBasell Industries Aflac McDonald’s Ally Financial Medtronic PLC AmeriHealth Caritas Midcontinent Independent System Operator (MISO) Avangrid Moelis & Company Baptist Memorial Health Care Corporation Monster Energy California Housing Finance Agency MultiCare Health System Carvana National Cybersecurity Alliance Casey’s New Albany Floyd County Schools…
-
If consequences matter, they should apply to vendors, too
The latest executive order pushes Washington to crack down on cyber fraud, but a different mandate eases software security accountability, leaving an inconsistent strategy that keeps the attack surface cheap to exploit. First seen on cyberscoop.com Jump to article: cyberscoop.com/washington-cybercrime-executive-order-software-security-gap/
-
Building Identity Resilience Against Deepfake Attacks
Gartner’s Apeksha Kaushik on Why Detection Alone Can’t Stop ID Impersonation. Organizations facing deepfake-driven impersonation attacks must move beyond traditional detection strategies and build stronger identity resilience. Security leaders should adopt layered defenses that combine detection, prevention and broader risk signals to disrupt attackers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/building-identity-resilience-against-deepfake-attacks-a-30964
-
Prevention is the Only Cloud Security Strategy That Works
In the evolving digital economy, adopting a prevention-first strategy for cloud workflows is essential. This article explores the importance of preemptive security measures to protect sensitive operations from breaches, detailing steps for organizations to enhance their security posture. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/prevention-is-the-only-cloud-security-strategy-that-works/
-
KI im IAM? Vorsicht walten lassen und mit Kontext prompten
Viele Firmen wollen möglichst zügig künstliche Intelligenz auch im Identity und Access Management nutzen. Larry Chinski, Chief Strategy Officer bei One Identity, argumentiert demgegenüber für eine einheitliche »Identity Fabric«, um die Cyberresilienz zu stärken. Ohne den richtigen Kontext, ohne Kontrolle und Übersicht, so warnt Chinski, bringt KI eher neue Risiken mit sich, statt sie zu……
-
My Really Fun RSA 2026 Presentations!
Tags: ai, apt, automation, cyber, cybersecurity, data, detection, google, governance, guide, lessons-learned, malware, soc, strategy, threatThis blog is perhaps a little bit more like an ad, so if you don’t want to check the ads, consider not reading it. a very cyber image (Gemini) But this year at RSA 2026, I’m speaking on three topics: securing AI, using AI for SOC, and sharing lessons about how Google applies AI and other technologies…
-
President Trump’s Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
Tags: access, ai, awareness, business, ceo, cloud, compliance, computing, cryptography, cyber, cybercrime, cybersecurity, data, defense, exploit, governance, government, healthcare, incident response, infrastructure, intelligence, international, malicious, network, regulation, resilience, risk, skills, startup, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability, zero-trustPresident Trump’s Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience. Key takeaways Cybersecurity as a global security imperative: The strategy signals that cybersecurity has evolved beyond a mere “IT issue” to become…
-
White House Cyber Strategy Prioritizes Offense
In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/white-house-cyber-strategy-prioritizes-offense
-
New White House cyber strategy pledges to ease regulations, ‘impose costs’ on bad actors
The White House unveiled its National Cyber Strategy, pledging more offensive cyber actions against criminal networks and adversarial governments. First seen on therecord.media Jump to article: therecord.media/trump-cyber-strategy-released-regulations
-
ISMG Security Report: Data-Extortion Ransomware Loses Steam
Revenue From Data-Extortion-Only Attacks Appear to Have Plummeted to Virtually Nil. While ransomware continues to disrupt businesses, thankfully some shakedown strategies are losing steam. The latest ISMG Security Report reviews how criminals have continued to refine the ransomware business model and why once-successful strategies for maximizing illicit profits now fall short. First seen on govinfosecurity.com…
-
Trump looks to power up post-quantum, AI security
The US has unveiled a six pillar national cyber security strategy, with developing technological areas such as post-quantum cryptography and artificial intelligence from and centre. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639879/Trump-looks-to-power-up-post-quantum-AI-security
-
Sean Cairncross lays out what’s coming next for Trump’s cyber strategy
The national cyber director is pitching an approach that blends cyber operations with diplomacy, law enforcement and pressure on CEOs to shore up their organizations. First seen on cyberscoop.com Jump to article: cyberscoop.com/national-cyber-director-trump-cyber-strategy-interagency-cell-critical-infrastructure-pilots/
-
Trump Administration Unveils New Cyber Strategy For America
US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/
-
Why AI Security Is Emerging as the Fourth Pillar of Cybersecurity
For decades, cybersecurity strategy has been built around three familiar pillars: endpoint security, network security, and cloud security. These domains have shaped how security teams are organised, where budgets are allocated, and how risks are understood across the enterprise. Each pillar emerged in response to a major shift in computing. The rise of personal devices…
-
No more soft play, President Trump warns in new cyber strategy
The White House released “President Trump’s Cyber Strategy for America,” a policy framework outlining the administration’s priorities for maintaining U.S. leadership in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/president-trumps-cyber-strategy-for-america-framework/
-
Tarnung als Taktik: Warum Ransomware-Angriffe raffinierter werden
Tags: access, ai, ciso, control, cyber, cyberattack, detection, encryption, endpoint, extortion, framework, intelligence, lockbit, mitre, openai, ransomware, RedTeam, service, software, strategy, threat, tool, vulnerabilityStatt eines kurzen, aber sehr schmerzhaften Stiches setzen Cyberkrimelle zunehmend darauf, sich in ihren Opfern festzubeißen und beständig auszusaugen.Ransomware-Angreifer ändern zunehmend ihre Taktik und setzen vermehrt auf unauffällige Infiltration. Dies liegt daran, dass die Drohung mit der Veröffentlichung sensibler Unternehmensdaten zum Hauptdruckmittel bei Erpressungen geworden ist.Der jährliche Red-Teaming-Bericht von Picus Security zeigt, dass Angreifer zunehmen…
-
Trump Administration Lays Out a High-Level Strategy to Combat Cybercrime
The Trump Administration released is long-anticipated national cybersecurity strategy that calls for an aggressive approach to attackers, use of AI and quantum, and protecting critical infrastructure. It’s full of rhetoric and proposals, but is short on details. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/trump-administration-lays-out-a-high-level-strategy-to-combat-cybercrime/
-
Cyberresilienz beginnt mit Backup: Ein Rahmenwerk für messbare Wiederherstellung
Cyberresilienz entscheidet sich nicht beim Backup, sondern bei der Wiederherstellung. Angesichts von Ransomware, kompromittierten Identitäten und komplexen Cloud”‘Abhängigkeiten müssen Unternehmen ihre Backup”‘Strategie konsequent auf messbare Recovery”‘Ergebnisse ausrichten. Dieser Beitrag zeigt, wie eine architekturgetriebene Enterprise”‘Backup”‘Strategie Wiederherstellbarkeit, Sicherheit und Resilienz systematisch in den Mittelpunkt stellt. Die Enterprise-Backup-Strategie hat sich weit über ihre traditionelle Rolle als operative… First…
-
Strategischer Mehrwert intelligenter Co-Piloten in der Cyberabwehr Warum KI die XDR/MDR-Strategie neu definiert
Cyberangriffe werden schneller, komplexer und schwerer erkennbar. Künstliche Intelligenz liefert den strategischen Vorsprung: Sie erkennt Muster früher, verdichtet Daten intelligent und unterstützt Analysten mit neuer Präzision. First seen on ap-verlag.de Jump to article: ap-verlag.de/strategischer-mehrwert-intelligenter-co-piloten-in-der-cyberabwehr-warum-ki-die-xdr-mdr-strategie-neu-definiert/102817/
-
How do I build a confident NHI lifecycle strategy
Are You Confident in Your NHI Lifecycle Strategy? The advent of cutting-edge technologies in cloud environments has accentuated the importance of Non-Human Identities (NHIs) in cybersecurity. Why do NHIs matter so much, and what steps can organizations take to establish a confident and comprehensive NHI lifecycle strategy? The answers, while not always simple, lie in……
-
Reading White House President Trump’s Cyber Strategy for America (March 2026)
White House released President Trump’s Cyber Strategy for America, framing cyberspace as a strategic domain to project power and counter growing cyber threats The White House has released “President Trump’s Cyber Strategy for America,” a document that outlines how the United States intends to maintain dominance in cyberspace and confront an increasingly hostile digital landscape.…

