#safeguarding-review

[ follow ]
#cybersecurity
EU data protection
fromSecurityWeek
15 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Node JS
fromInfoQ
6 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Psychology
fromSilicon Canals
18 hours ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
DevOps
fromMedium
1 day ago

AWS Security and Compliance Quiz (25 Questions) with Detailed Answers - Cloud Practitioner Guide

Understanding AWS security services is essential for modern applications running on AWS.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
EU data protection
fromTheregister
5 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
EU data protection
fromTheregister
5 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
#ai-governance
Artificial intelligence
fromEntrepreneur
2 weeks ago

How to Govern AI Before It Damages Your Brand

AI interactions directly shape brand perception, and customers attribute AI errors to the company rather than the algorithm, making AI governance essential for maintaining trust.
Artificial intelligence
fromEntrepreneur
2 weeks ago

How to Govern AI Before It Damages Your Brand

AI interactions directly shape brand perception, and customers attribute AI errors to the company rather than the algorithm, making AI governance essential for maintaining trust.
Remote teams
fromInfoQ
3 days ago

How to Handle Trusts and Psychological Safety When Scaling Organizations

Trust must be built team by team; it cannot be replicated as organizations scale.
Bootstrapping
fromEntrepreneur
3 days ago

Your Management Strategy Is Doomed to Fail If You Don't Do This

Effective management focuses on execution through a straightforward approach: face reality, investigate issues, fix them systematically, and own the outcomes.
Public health
fromMail Online
4 days ago

Elderly people should be SEPARATED on flights to speed up evacuations

Elderly passengers should be distributed evenly on flights to enhance emergency evacuation efficiency.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Science
fromHigh Country News
5 days ago

New nuclear safety rules reduce protections for workers, the public - High Country News

Easing radiation standards threatens worker safety in the nuclear industry, according to a veteran who handled radioactive materials for decades.
Austin
fromFast Company
6 days ago

This new tech could help prevent future runway crashes

New runway collision warning technology could significantly enhance aviation safety by providing pilots with immediate alerts.
Information security
fromTNW | Insights
11 hours ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Remote teams
fromTheregister
5 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
#ai
Artificial intelligence
fromSecurityWeek
5 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Artificial intelligence
fromSecurityWeek
5 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
DevOps
fromThe Hacker News
5 days ago

3 SOC Process Fixes That Unlock Tier 1 Productivity

Fragmented workflows and manual triage slow down Tier 1 SOC performance more than the threats themselves.
fromTechCrunch
3 days ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro detected an intrusion on March 28, prompting the company to take down some of its systems. Parts of Hasbro's website appeared down, with error messages indicating maintenance.
Privacy professionals
London startup
fromFortune
2 weeks ago

UL Solutions rolls out a new standard to fill a gap in AI regulation: 'Innovation without safety is failure' | Fortune

UL Solutions launches its first AI product certification standard (UL 3115) to ensure AI-embedded products are safe, robust, and human-controlled, addressing the lack of government oversight in rapidly evolving AI technology.
Online learning
fromeLearning Industry
2 weeks ago

Can An LMS Really Reduce Compliance Risk Before It Happens?

A strategically positioned LMS reduces compliance risk by ensuring consistent policy communication across organizations and enabling rapid regulatory updates, transforming it from a reporting tool into a proactive risk management system.
DevOps
fromDevOps.com
1 week ago

Security as Code is Becoming the New Baseline: Continuous Compliance in DevOps - DevOps.com

Compliance must be integrated into the delivery pipeline as a continuous practice rather than a periodic checkpoint.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
fromMedium
2 weeks ago

TruRisk : Qualys' Approach for Prioritizing Asset for Patch Management

TruRisk is designed to aggregate vulnerability data at the asset level and convert it into a measurable, business-aligned cyber risk score. Rather than evaluating vulnerabilities in isolation, TruRisk calculates a consolidated risk value per asset by helping security teams understand which systems pose the greatest operational and strategic risk.
Business intelligence
DevOps
fromInfoQ
1 week ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
#ai-security
Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
fromZDNET
1 month ago
Miscellaneous

Rolling out AI? 5 security tactics your business can't get wrong - and why

Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
fromZDNET
1 month ago
Miscellaneous

Rolling out AI? 5 security tactics your business can't get wrong - and why

Information security
fromInfoQ
2 days ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
#physical-security
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#executive-protection
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Privacy professionals
fromwww.housingwire.com
2 weeks ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
US politics
fromABC7 Los Angeles
1 month ago

Anthropic refuses to bend to Pentagon on AI safeguards as dispute nears deadline

Anthropic refuses Pentagon demands to remove ethical safeguards from Claude, risking military contract termination and supply chain risk designation that could damage partnerships.
Information security
fromThe Hacker News
2 days ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
DevOps
fromComputerWeekly.com
3 weeks ago

Strong security balances consolidation and best-of-breed capabilities | Computer Weekly

Security platformisation delivers genuine value through native data correlation across integrated telemetry sources, not just operational efficiency from consolidation.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromComputerWeekly.com
4 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
#ai-cybersecurity
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Law
fromBusline News
1 month ago

Dollars, Lawsuits & Culture: The Business Case For Relentless Inspections - Busline News

Relentless, disciplined vehicle inspections transform random mechanical failures into planned maintenance, reduce legal and regulatory risk, and protect profitability.
Business
fromHarvard Business Review
2 months ago

Where to Look for Ethical Risk Inside a Company

Unchecked integrity gaps—overlooked conflicts of interest, offensive behavior, or aggressive sales practices—can escalate into severe reputational and financial harm.
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Information security
fromComputerWeekly.com
2 weeks ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
fromFortune
2 months ago

As risk skyrockets, current and former CFOs are in demand for audit committees | Fortune

As audit committees confront a rapidly expanding risk landscape, their role in corporate governance is being reshaped. Boards have often turned to current and former CFOs as independent directors, particularly for audit committees, because of their ability to translate complex operational and financial realities into effective oversight.For example, this month, J. Michael Hansen, former EVP and CFO of Cintas Corporation, was appointed to the audit committee at Paychex.
Business
Information security
fromSecuritymagazine
3 weeks ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
Information security
fromComputerWeekly.com
3 weeks ago

How CISOs can build a truly unified and resilient security platform | Computer Weekly

Modern enterprise security requires rethinking architecture from perimeter defense to distributed asset protection across decentralized networks and cloud environments.
Information security
fromSecuritymagazine
3 weeks ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Information security
fromComputerWeekly.com
3 weeks ago

Vulnerability reports: Increase in quantity, decrease in quality? | Computer Weekly

Bug bounty programs face sustainability challenges due to increased low-quality submissions, prompting cURL founder Daniel Stenberg to shut down his HackerOne program and switch to GitHub for vulnerability reporting.
Information security
fromSecurityWeek
3 weeks ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
Artificial intelligence
fromComputerWeekly.com
1 month ago

Second ever international AI safety report published | Computer Weekly

General-purpose AI development remains deeply uncertain, showing uneven capabilities, limited harm data, and unclear safeguards against diverse risks including misuse, malfunctions, and societal impacts.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromTechzine Global
1 month ago

Cyber resilience gap: High confidence, but reality lags behind

Organizations invest heavily in cyber resilience but remain vulnerable to external threats due to perimeter-focused strategies that neglect ecosystem-wide protection.
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
Information security
fromwww.housingwire.com
2 months ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
Information security
fromTechzine Global
1 month ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
fromThe Hacker News
2 months ago

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can't absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response.
Information security
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromSecuritymagazine
1 month ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
[ Load more ]