#document-release-deadline

[ follow ]
#agile
Agile
fromdzone.com
1 day ago

Rethinking Risk in Agile Software Development

Agile must integrate risk management into workflows to avoid hidden risks and instability in complex software systems.
fromMountaingoatsoftware
2 months ago
Software development

Estimating and Planning in Agile: Why They Still Matter in 2026

Estimating and planning remain essential for making transparent, decision-focused trade-offs rather than attempting perfect predictions.
Agile
fromdzone.com
1 day ago

Rethinking Risk in Agile Software Development

Agile must integrate risk management into workflows to avoid hidden risks and instability in complex software systems.
Information security
fromComputerWeekly.com
1 day ago

Surging CVE disclosures force NIST to shake up workflows | Computer Weekly

NIST is changing its approach to handling CVEs, focusing on those with the greatest potential impact due to increased submissions.
#ai-governance
DevOps
fromThe Hacker News
1 month ago

New RFP Template for AI Usage Control and AI Governance

Organizations have AI security budgets but lack clear requirements for AI governance solutions, requiring a structured evaluation framework focused on interaction-level control rather than application cataloging.
DevOps
fromThe Hacker News
1 month ago

New RFP Template for AI Usage Control and AI Governance

Organizations have AI security budgets but lack clear requirements for AI governance solutions, requiring a structured evaluation framework focused on interaction-level control rather than application cataloging.
Environment
fromComputerWeekly.com
1 week ago

What you need to know before emissions regulators come knocking | Computer Weekly

IT infrastructure carbon emissions reporting is becoming a global regulatory requirement with strict compliance standards.
DevOps
fromDevOps.com
1 week ago

Why Most DevSecOps Pipelines Fail at Runtime Security (not Build Time) - DevOps.com

Runtime risk arises from configuration and infrastructure changes post-deployment, necessitating DevSecOps to enhance security earlier in the delivery process.
Portland
fromTheregister
2 weeks ago

Contractor quaffed his way to Y2K compliance

Y2K preparations included humorous incidents, with a contractor enjoying beers while ensuring systems were ready for the millennium change.
#ai-security
fromInfoWorld
1 week ago
Software development

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

fromInfoWorld
2 weeks ago
Information security

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Software development
fromInfoWorld
1 week ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Information security
fromInfoWorld
2 weeks ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
#cybersecurity
Law
fromAbove the Law
1 month ago

Seven Essential Security Strategies For Law Firms And Legal Departments - Above the Law

Legal professionals must prioritize cybersecurity as a leadership imperative, with one in three law firms targeted by breaches costing over five million dollars annually, requiring proactive vendor management and transparent security practices.
#compliance
fromTNW | Offers
3 weeks ago
EU data protection

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
DevOps
fromDevOps.com
3 weeks ago

Security as Code is Becoming the New Baseline: Continuous Compliance in DevOps - DevOps.com

Compliance must be integrated into the delivery pipeline as a continuous practice rather than a periodic checkpoint.
EU data protection
fromTNW | Offers
3 weeks ago

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
DevOps
fromDevOps.com
3 weeks ago

Security as Code is Becoming the New Baseline: Continuous Compliance in DevOps - DevOps.com

Compliance must be integrated into the delivery pipeline as a continuous practice rather than a periodic checkpoint.
EU data protection
fromBusiness Matters
3 weeks ago

Companies House disciplines over 100 staff amid compliance concerns

Companies House disciplined 132 employees for policy breaches, highlighting operational challenges and the need for stronger data security measures.
Online learning
fromeLearning Industry
1 month ago

Can An LMS Really Reduce Compliance Risk Before It Happens?

A strategically positioned LMS reduces compliance risk by ensuring consistent policy communication across organizations and enabling rapid regulatory updates, transforming it from a reporting tool into a proactive risk management system.
Washington DC
fromNextgov.com
1 month ago

Governments' website accessibility deadline is fast approaching

Government websites with populations of 50,000+ must comply with federal disability accessibility standards by April 30, following Title II of the Americans with Disabilities Act.
Agile
fromBusiness Matters
1 month ago

How to Avoid Construction Delays and Stay on Schedule

Construction delays can derail projects due to poor planning, resource shortages, and communication breakdowns, but can be mitigated with effective strategies and technology.
Privacy professionals
fromwww.housingwire.com
1 month ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
EU data protection
fromTNW | Ecosystems
4 weeks ago

DORA compliance: most European financial firms still aren't ready

Europe's financial institutions struggle to comply with the Digital Operational Resilience Act, with many lacking confidence in meeting the 2025 deadline.
Law
fromIPWatchdog.com | Patents & Intellectual Property Law
1 month ago

Legal Groups Push for Mandatory Disclosure of Litigation Funders

Third-party litigation funders must disclose their involvement in federal civil cases through a proposed amendment to Federal Rule of Civil Procedure 26(a)(1)(A) to establish uniform disclosure requirements across inconsistent federal courts.
Software development
fromInfoQ
1 month ago

QCon London 2026: SBOMs Move From Best Practice to Legal Obligation as CRA Enforcement Looms

Software teams must urgently adopt SBOMs due to imminent regulatory requirements in the US and Europe, with enforcement beginning September 2026 and full compliance required by December 2027.
Information security
fromComputerWeekly.com
3 weeks ago

Platformisation or platform theatre? Navigating cyber consolidation | Computer Weekly

Consolidation in enterprise security is necessary but can introduce risks like single points of failure and integration issues.
DevOps
fromDevOps.com
1 month ago

Policy as Code for Cost Control, Not Just Compliance - DevOps.com

Policy as code prevents cloud cost waste by enforcing guardrails at infrastructure provisioning time, stopping small routine decisions from accumulating into significant overspend.
Intellectual property law
fromAbove the Law
1 month ago

AI Contracts Are Moving Faster Than The Laws. In-House Counsel Can't Wait. - Above the Law

Legal teams must adapt rapidly to AI deployment pressures by drafting contracts for current conditions and anticipated regulatory changes within six to twelve months, as law moves slower than technology.
fromTheregister
1 month ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
Privacy professionals
fromBusiness Matters
1 month ago

Companies House suspends online filing service after cyber vulnerability exposes director data

Companies House suspended its WebFiling service after a security vulnerability allowed users to access and edit other companies' sensitive personal data through a browser back button exploit.
Agile
fromInfoWorld
1 month ago

Save money by canceling more software projects, says survey

Enterprises should cancel underperforming projects more aggressively; those using scenario planning and ruthless viability assessment achieve better ROI outcomes.
fromMedium
1 month ago

Mastering Azure Governance: Why It Matters and How to Get Started

Azure Governance is the set of policies, processes, and technical controls that ensure your Azure environment is secure, compliant, and well-managed. It provides a structured approach to organizing subscriptions, resources, and management groups, while defining standards for naming, tagging, security, and operational practices.
DevOps
US politics
fromFlowingData
1 month ago

Database to explore conflicts of interest through financial disclosures

ProPublica created a searchable database of financial disclosure documents from the president and 1,573 executive branch appointees, revealing their assets, outside positions, and compensation.
DevOps
fromTheregister
1 month ago

West Sussex County Council pushes back Oracle rollout again

West Sussex County Council delayed Oracle Fusion HR and payroll implementation to October 2026, with project costs escalating to over 15 times the original £2.6 million estimate.
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
fromBusiness Insider
1 month ago

Microsoft says Anthropic's products can stay on its platforms after lawyers 'studied' the Pentagon supply chain risk designation

A Microsoft spokesperson told Business Insider on Thursday that the company's "lawyers have studied the designation and have concluded that Anthropic products, including Claude, can remain available to our customers." Claude will still be available to customers through platforms such as M365, GitHub, and Microsoft's AI Foundry, except for the Department of War.
Tech industry
Business
fromHarvard Business Review
2 months ago

Where to Look for Ethical Risk Inside a Company

Unchecked integrity gaps—overlooked conflicts of interest, offensive behavior, or aggressive sales practices—can escalate into severe reputational and financial harm.
Fundraising
fromBusiness Matters
2 months ago

Which Grant Management Tools Are Best for Government Agencies?

Cloud-based grant management software helps government agencies organize workflows, track metrics, run reports, improve recordkeeping, and support implementation through configurable products and vendor support.
Deliverability
fromBusiness Matters
1 month ago

9 Ways to Split Up Big Documents into Smaller, Shareable Files

Large documents can be efficiently split into smaller, manageable files using online tools and built-in software features without losing formatting or quality.
Productivity
fromdzone.com
2 months ago

Eliminating Reporting Noise in Agile Teams

Unstructured proliferation of reports creates cognitive overload, wastes time, and undermines Agile teams' clarity, decision-making, and delivery.
fromComputerWeekly.com
1 month ago

Weighing up the enterprise risks of neocloud providers | Computer Weekly

Neocloud providers, which include the likes of Nscale, CoreWeave and Carbon3.ai, are having a somewhat disruptive impact on the market by making huge commitments to build out hyperscale datacentres in support of the UK government's AI growth agenda. These providers are also taking up capacity in colocation datacentres that some of the hyperscale cloud giants previously committed to renting space in, before pulling out.
Miscellaneous
World politics
fromMedium
2 months ago

Beyond the waterfall state: why missions need a different decision-making architecture

Government needs architectures that combine stewardship of stable systems with agile approaches enabling divergent creativity, collective judgement, and experimentation to manage uncertainty.
fromComputerWeekly.com
1 month ago

RWS Global deploys Box's AI tools to streamline contract workflow | Computer Weekly

The end user types in the information that needs to go into a contract via Box Doc Gen, which is then sent over to Legal for approval. Once approved, the contract is sent out automatically and signed using Box Sign. The signed contract is then uploaded to the cloud. Given that RWS Global has contracts with thousands of performers, the automation of the contract approval workflow saves many hours in terms of manual processing.
Business intelligence
Privacy technologies
fromTechCrunch
2 months ago

Complyance raises $20M to help companies manage risk and compliance | TechCrunch

Complyance uses AI agents to run continuous governance, risk, and data compliance checks for enterprises, automating manual audits and assessing vendor risk.
Information security
fromSecuritymagazine
1 month ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Business
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Workflow automation for UK accounting firms: the real reasons it matters now - London Business News | Londonlovesbusiness.com

Workflow interruptions, not technical skill, constrain UK accounting firms; workflow automation is essential hygiene to protect capacity and meet upcoming compliance rhythms.
Information security
fromTechzine Global
1 month ago

When is an SBOM not an SBOM? CISA's Minimum Elements

CISA's new SBOM Minimum Elements establish baseline standards for software supply chain security, while EU regulations legally mandate SBOMs, creating a global baseline that organizations must meet to remain competitive.
Artificial intelligence
fromFast Company
2 months ago

Do you really know what 'agent' means? If not, you're putting your company at risk

The term 'AI agent' has been stretched to include many different systems, creating confusion that distorts public debate and hinders enterprise adoption and strategy.
US politics
fromNextgov.com
2 months ago

Navigating FedRAMP 20x and the continuous compliance imperative

Federal agencies need modern commercial software but compliance barriers and inconsistent FedRAMP standards block adoption.
Miscellaneous
fromTechzine Global
1 month ago

Oracle and SAP license chaos: Know what you have before your move

Oracle and SAP are pressuring on-premises customers toward cloud migration through rising support costs and end-of-life dates, though the transition proves complex and expensive due to unclear licensing and organizational unpreparedness.
Law
fromAbove the Law
2 months ago

Lawyers Should Circulate Word Versions Of Documents To Be Negotiated - Above the Law

Send editable Word documents rather than PDFs when a document requires negotiation to enable redlining and avoid formatting issues from PDF-to-Word conversion.
Business
fromThe Drum
2 months ago

The dos and don'ts of the M&A rulebook for agencies

M&A activity favors agencies that grew during COVID-19, with buyers seeking scalable, digitally capable firms and increased interest in APAC independents.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
fromFast Company
2 months ago

Why your AI project is about to get deprioritized (and how to save it)

Your AI pilot showed 94% accuracy improvements. The LLM is yielding solid results. You're getting defunded anyway. The reason? You solved a problem AI can solve. Your budget-holder needed you to solve theirs. Companies launch AI pilots that produce results, then stall at scale. The team's diagnosis: "They don't get it." What's really going on: These projects never earned budget-holder buy-in.
Artificial intelligence
Tech industry
fromThe Verge
2 months ago

Docusign's CEO on the dangers of trusting AI to read, and write, your contracts

DocuSign employs 7,000 people to build and expand an e-signature and contract automation platform integrating AI for summarization and document generation.
Law
fromAbove the Law
2 months ago

'Adventures In Legal Tech': Defeating Technology Overload - Above the Law

Law firms should streamline technology stacks, prioritize time-efficient vendor vetting and demos, and choose vendors who actively gather feedback to reduce tech overload.
fromFortune
2 months ago

As risk skyrockets, current and former CFOs are in demand for audit committees | Fortune

As audit committees confront a rapidly expanding risk landscape, their role in corporate governance is being reshaped. Boards have often turned to current and former CFOs as independent directors, particularly for audit committees, because of their ability to translate complex operational and financial realities into effective oversight.For example, this month, J. Michael Hansen, former EVP and CFO of Cintas Corporation, was appointed to the audit committee at Paychex.
Business
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Software development
fromdzone.com
2 months ago

How Communication Profiling Stops Agile Delivery Breakdowns

Communication incompatibility is a systemic delivery risk; design Agile delivery systems to accommodate differing communication styles rather than only teaching individual communication skills.
Law
fromBusline News
2 months ago

Dollars, Lawsuits & Culture: The Business Case For Relentless Inspections - Busline News

Relentless, disciplined vehicle inspections transform random mechanical failures into planned maintenance, reduce legal and regulatory risk, and protect profitability.
fromeLearning Industry
2 months ago

Why Data Privacy Is Mission-Critical In Corporate eLearning

There's been an explosion in the growth of corporate eLearning initiatives in the post-COVID era. That's due in part to the growth in remote work and geographically distributed teams. Unfortunately, there are always growing pains when any corporate initiative scales up in a hurry. In the case of eLearning, one of those growing pains is a tendency to let data privacy standards fall by the wayside.
Privacy professionals
fromMedium
2 months ago

Test smart: how to solve dilemmas as QA?

To find the typical example, just observe an average stand-up meeting. The ones who talk more get all the attention. In her article, software engineer Priyanka Jain tells the story of two colleagues assigned the same task. One posted updates, asked questions, and collaborated loudly. The other stayed silent and shipped clean code. Both delivered. Yet only one was praised as a "great team player."
Software development
Privacy professionals
fromExchangewire
1 month ago

EscalaX Reinforces its Privacy & Compliance With BidSafe One

EscalaX partners with BidSafe One to strengthen privacy, consent management, and regulatory compliance across programmatic advertising, ensuring secure multichannel data governance.
fromEntrepreneur
1 month ago

Here's a Simple Way to Take Control of PDFs at Work

Stop struggling with PDFs and wasting precious minutes of your workday. PDF Agile is ready to help you make peace with these files, serving as an all-in-one PDF tool. You can edit, convert, view, and more, all in one spot, and this lifetime subscription lets you take advantage of this tool forever. Need to fill out a PDF? No problem with PDF Agile. You can also mark up the text with commenting tools, annotate with highlights, underlines, strikethroughs, and more.
Software development
Software development
fromAnarc
2 months ago

Keeping track of decisions using the ADR model

TPA replaced RFCs with a simpler ADR process featuring a five-heading template, streamlined workflow, and separate communication guidelines.
fromInfoQ
2 months ago

Developers Can Improve the ESG Aspects of Software By Tackling Early Ethical Debt

Olimpiu Pop: Hello everybody. I'm Olimpiu Pop, an InfoQ editor, and I have in front of me Erica Pisani, one of the track hosts of QCon London 2025, and a very important track in my opinion. One that is important in general, but even more important these days. And the name of the track was performance and sustainability, which seems to be two opposing words. So, Erica, please introduce yourself.
Software development
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
Information security
fromTechzine Global
2 months ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
[ Load more ]