#security-governance

[ follow ]
fromThe Hacker News
6 days ago

Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents

AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits: "Wait... who approved this?" Unlike users or applications, AI agents are often deployed quickly, shared broadly, and granted wide access permissions, making ownership, approval, and accountability difficult to trace. What was once a straightforward question is now surprisingly hard to answer.
Artificial intelligence
fromTechzine Global
2 weeks ago

6 predictions for the AI economy: 2026's new rules of cybersecurity

2026 will mark the inflection point where the global economy transitions from "AI-assisted" to "AI-native." We won't just adopt new tools, we'll build a new economic reality: The AI Economy. Autonomous AI agents, entities with the ability to reason, act and remember, will define this new era. We'll delegate key tasks to these agents, from triaging alerts in the security operations center (SOC) to building financial models for corporate strategy.
Information security
Information security
fromComputerWeekly.com
1 month ago

Cyber's defining lessons of 2025, and what comes next | Computer Weekly

Combine people-focused defenses, AI-aware testing, and stronger governance to counter nation-state threats, social engineering, and emerging AI-driven attack vectors.
fromThe Hacker News
4 months ago

Cracking the Boardroom Code: Helping CISOs Speak the Language of Business

CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders: how do I make the impact of risk clear to business decision-makers?
Information security
UK news
fromwww.bbc.com
4 months ago

It's taken three years to recover from China hack, election watchdog says

The UK's Electoral Commission took three years and at least £250,000 to recover from a hack exposing 40 million voters after basic security failures.
Artificial intelligence
fromDevOps.com
5 months ago

Survey Surfaces Raft of AI Coding Issues Involving Embedded Systems - DevOps.com

AI coding assistants are widely used in embedded-system development, but governance, security, and open-source license risk confidence remain lacking.
Cryptocurrency
fromHackernoon
1 year ago

What Happens After You Hit 'Send' on Blockchain | HackerNoon

Blockchain design hinges on separating transaction order finality from state value finality, enhancing flexibility and security.
[ Load more ]