<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:georss="http://www.georss.org/georss" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>DISC Infosec blog</title>
	<atom:link href="http://blog.deurainfosec.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://blog.deurainfosec.com/</link>
	<description>Dedicated to information security assurance&#13;
Information Security subject matter with related items</description>
	<lastBuildDate>Tue, 21 Apr 2026 23:21:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://blog.deurainfosec.com/wp-content/uploads/2023/05/disc-logo-144x144.jpg</url>
	<title>DISC InfoSec blog</title>
	<link>https://blog.deurainfosec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">7400975</site>	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>AI Adoption Is Outpacing Governance: Four Trends Every Leader Should Watch</title>
		<link>https://blog.deurainfosec.com/ai-adoption-is-outpacing-governance-four-trends-every-leader-should-watch/</link>
					<comments>https://blog.deurainfosec.com/ai-adoption-is-outpacing-governance-four-trends-every-leader-should-watch/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 23:21:01 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Adoption]]></category>
		<category><![CDATA[Colorado AI Act]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34589</guid>

					<description><![CDATA[<p>1. Adoption is outrunning accountability Generative AI is now embedded in 77% of organizations, but only 37% have a formal AI policy guiding how it&#8217;s used. That delta isn&#8217;t a technology problem — it&#8217;s a governance failure waiting to surface. The first time something goes wrong, the absence of a documented framework becomes the story. [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-adoption-is-outpacing-governance-four-trends-every-leader-should-watch/" data-wpel-link="internal" target="_blank">AI Adoption Is Outpacing Governance: Four Trends Every Leader Should Watch</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-adoption-is-outpacing-governance-four-trends-every-leader-should-watch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34589</post-id>	</item>
		<item>
		<title>The Colorado AI Act is 70 Days Away. Here’s How to Know If You’re Ready</title>
		<link>https://blog.deurainfosec.com/the-colorado-ai-act-is-70-days-away-heres-how-to-know-if-youre-ready/</link>
					<comments>https://blog.deurainfosec.com/the-colorado-ai-act-is-70-days-away-heres-how-to-know-if-youre-ready/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 16:27:12 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Cyber maturity]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Colorado AI Act]]></category>
		<category><![CDATA[Colorado SB 24-205]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34552</guid>

					<description><![CDATA[<p>The Colorado AI Act Is&#160;70 Days Away.&#160;Here&#8217;s How to Know If You&#8217;re Ready. A clause-by-clause maturity assessment for developers and deployers of high-risk AI systems under SB 24-205 — and what to do with the score. Days Remaining 70 On August 28, 2025, Governor Polis signed SB 25B-004 and quietly bought every AI developer and [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-colorado-ai-act-is-70-days-away-heres-how-to-know-if-youre-ready/" data-wpel-link="internal" target="_blank">The Colorado AI Act is 70 Days Away. Here&#8217;s How to Know If You&#8217;re Ready</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-colorado-ai-act-is-70-days-away-heres-how-to-know-if-youre-ready/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34552</post-id>	</item>
		<item>
		<title>AI Vulnerability Storm: Why Machine-Speed Attacks Demand a New Security Operating Model</title>
		<link>https://blog.deurainfosec.com/ai-vulnerability-storm-why-machine-speed-attacks-demand-a-new-security-operating-model/</link>
					<comments>https://blog.deurainfosec.com/ai-vulnerability-storm-why-machine-speed-attacks-demand-a-new-security-operating-model/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 21:00:16 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[AI Vulnerability Storm]]></category>
		<category><![CDATA[Claude Mythos]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34529</guid>

					<description><![CDATA[<p>Source: The Mythos Zero-Day Flood Is Here. Only AI Can Fix It. The article argues that cybersecurity has entered a new phase driven by advanced AI systems like Claude Mythos Preview. These systems are capable of autonomously discovering zero-day vulnerabilities across major operating systems and browsers—something that previously required elite, well-funded research teams. This marks [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-vulnerability-storm-why-machine-speed-attacks-demand-a-new-security-operating-model/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI Vulnerability Storm: Why Machine-Speed Attacks Demand a New Security Operating Model&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-vulnerability-storm-why-machine-speed-attacks-demand-a-new-security-operating-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34529</post-id>	</item>
		<item>
		<title>AI Policy Enforcement in Practice: From Theory to Control</title>
		<link>https://blog.deurainfosec.com/ai-policy-enforcement-in-practice-from-theory-to-control/</link>
					<comments>https://blog.deurainfosec.com/ai-policy-enforcement-in-practice-from-theory-to-control/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 17:18:47 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[AI Guardrails]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI Policy enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34498</guid>

					<description><![CDATA[<p>AI Policy Enforcement in Practice: From Theory to Control What is AI Policy Enforcement? AI policy enforcement is the operationalization of governance rules that control how AI systems are used, what data they can access, and how outputs are generated, stored, and shared. It moves beyond written policies into real-time, technical controls that actively monitor [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-policy-enforcement-in-practice-from-theory-to-control/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI Policy Enforcement in Practice: From Theory to Control&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-policy-enforcement-in-practice-from-theory-to-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34498</post-id>	</item>
		<item>
		<title>AI Vulnerability Scorecard: Discover Your AI Attack Surface Before Attackers Do</title>
		<link>https://blog.deurainfosec.com/ai-vulnerability-scorecard-discover-your-ai-attack-surface-before-attackers-do/</link>
					<comments>https://blog.deurainfosec.com/ai-vulnerability-scorecard-discover-your-ai-attack-surface-before-attackers-do/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 15:21:47 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34382</guid>

					<description><![CDATA[<p>What is an “AI Vulnerability Storm”? An AI Vulnerability Storm is a rapid, large-scale surge in vulnerability discovery, exploitation, and attack execution driven by advanced AI systems. These systems can autonomously find flaws, generate exploits, and launch attacks faster than organizations can respond. Why it’s happening (root causes) Bottom line: This is not just more [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-vulnerability-scorecard-discover-your-ai-attack-surface-before-attackers-do/" data-wpel-link="internal" target="_blank">AI Vulnerability Scorecard: Discover Your AI Attack Surface Before Attackers Do</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-vulnerability-scorecard-discover-your-ai-attack-surface-before-attackers-do/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34382</post-id>	</item>
		<item>
		<title>API Security in the Age of AI: Why Vulnerability Assessment Is Non-Negotiable</title>
		<link>https://blog.deurainfosec.com/api-security-in-the-age-of-ai-why-vulnerability-assessment-is-non-negotiable/</link>
					<comments>https://blog.deurainfosec.com/api-security-in-the-age-of-ai-why-vulnerability-assessment-is-non-negotiable/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 19:23:45 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[API Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34373</guid>

					<description><![CDATA[<p>API Security — what it is and why it mattersAPI security is the practice of protecting application programming interfaces (APIs) from unauthorized access, abuse, and data exposure. APIs are the connective tissue between systems—apps, services, partners, and now AI models. Because they expose business logic and sensitive data directly, a single weak API can bypass [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/api-security-in-the-age-of-ai-why-vulnerability-assessment-is-non-negotiable/" data-wpel-link="internal" target="_blank">&lt;strong&gt;API Security in the Age of AI: Why Vulnerability Assessment Is Non-Negotiable&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/api-security-in-the-age-of-ai-why-vulnerability-assessment-is-non-negotiable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34373</post-id>	</item>
		<item>
		<title>AI Attack Surface ScoreCard</title>
		<link>https://blog.deurainfosec.com/ai-attack-surface-scorecard/</link>
					<comments>https://blog.deurainfosec.com/ai-attack-surface-scorecard/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 15:31:34 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI Attack Surface]]></category>
		<category><![CDATA[AI Attack Surface ScoreCard]]></category>
		<category><![CDATA[AI Scorecard]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34302</guid>

					<description><![CDATA[<p>Uncover where your AI systems are truly vulnerable—before attackers do. The AI Attack Surface Scorecard is a powerful, rapid 20-question assessment that pinpoints how your AI models, agents, and automated workflows can be exploited across critical domains like prompt injection, model access, data leakage, and supply chain risk. Built with real-world threat scenarios, it delivers [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-attack-surface-scorecard/" data-wpel-link="internal" target="_blank">AI Attack Surface ScoreCard</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-attack-surface-scorecard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34302</post-id>	</item>
		<item>
		<title>AI-Accelerated Offense: Why Security Programs Must Move Now, Not Later</title>
		<link>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/</link>
					<comments>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 21:30:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Security Professional]]></category>
		<category><![CDATA[Security program]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[AI Offence]]></category>
		<category><![CDATA[AI-Accelerated Offense]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34292</guid>

					<description><![CDATA[<p>Preparing a security program for AI-accelerated offense means accepting a hard reality: within the next couple of years, AI will uncover a significant portion of the vulnerabilities currently hidden in your code—and not always before attackers do. The advantage shifts to organizations that act now by operating at machine speed. That means making 24-hour patching [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI-Accelerated Offense: Why Security Programs Must Move Now, Not Later&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34292</post-id>	</item>
		<item>
		<title>AI Governance Explained: Accountability, Trust, and Control in the Age of AI</title>
		<link>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 20:52:05 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34268</guid>

					<description><![CDATA[<p>AI isn’t a tech problem—it’s about ownership, accountability, and trust at scale. AI Governance AI governance is about setting clear rules for how AI uses data, assigning accountability for every decision it makes, and ensuring you can trace and explain outcomes—especially when something goes wrong. It’s not complex in principle: define what AI is allowed [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI Governance Explained: Accountability, Trust, and Control in the Age of AI&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34268</post-id>	</item>
		<item>
		<title>Measure What Matters: Security &amp; AI Readiness Scorecard</title>
		<link>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/</link>
					<comments>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 17:28:21 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27k]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[NIST CSF]]></category>
		<category><![CDATA[AI Readiness Scorecard]]></category>
		<category><![CDATA[Risk scorecard]]></category>
		<category><![CDATA[Security Readiness Scorecard]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34240</guid>

					<description><![CDATA[<p>From Chaos to Confidence: Your 30-Minute Security &#38; AI Risk Scorecard Most security leaders focus on tools, frameworks, and compliance. But the real differentiator? Mindset. “I am whole, perfect, strong, powerful, loving, harmonious, and happy.” This isn’t just an affirmation from Charles Fillmore—it’s a blueprint for modern security leadership. Because cybersecurity is not just a [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/" data-wpel-link="internal" target="_blank">Measure What Matters: Security &amp; AI Readiness Scorecard</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34240</post-id>	</item>
		<item>
		<title>Security Is a People Problem: Culture, Behavior, and Decisions Drive Cyber Resilience</title>
		<link>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/</link>
					<comments>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 20:15:31 +0000</pubDate>
				<category><![CDATA[Cyber resilience]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Is a People Problem]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34221</guid>

					<description><![CDATA[<p>How Security Is, First and Foremost, a People Issue At its core, security depends on human behavior—how people design systems, configure controls, respond to threats, and make daily decisions. Technology can enforce rules and automate defenses, but humans create, manage, and sometimes bypass those controls. Most incidents—whether phishing, misconfigurations, or insider actions—originate from human choices. [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Security Is a People Problem: Culture, Behavior, and Decisions Drive Cyber Resilience&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34221</post-id>	</item>
		<item>
		<title>Security Driven by Business Value: Focus, Prioritize, Protect What Matters Most</title>
		<link>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/</link>
					<comments>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 17:27:38 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[Security Driven by Business]]></category>
		<category><![CDATA[Security Support Mission]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34210</guid>

					<description><![CDATA[<p>How “Security Must Be Driven by Business Need” Is Accomplished This is achieved by tightly aligning security strategy with business objectives, revenue drivers, and operational priorities. Instead of applying controls uniformly, organizations perform risk-based assessments tied to critical business processes, assets, and data flows. Security leaders collaborate with executives to understand what truly impacts revenue, [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Security Driven by Business Value: Focus, Prioritize, Protect What Matters Most&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34210</post-id>	</item>
		<item>
		<title>Claude Mythos and the Future of Cybersecurity: Powerful—and Potentially Dangerous</title>
		<link>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/</link>
					<comments>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 22:22:45 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Claude Mythos]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34195</guid>

					<description><![CDATA[<p>Too Powerful to Release? The AI Model That’s Exposing Hidden Cyber Risk This development is one that deserves close attention. Anthropic has introduced Project Glasswing, a new industry coalition that brings together major players across technology and financial services. At the center of this initiative is a highly advanced frontier model known as Claude Mythos [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/" data-wpel-link="internal" target="_blank">Claude Mythos and the Future of Cybersecurity: Powerful—and Potentially Dangerous</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34195</post-id>	</item>
		<item>
		<title>Hackers at Machine Speed: The AI Cybersecurity Reality</title>
		<link>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/</link>
					<comments>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 20:44:42 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI force multiplier]]></category>
		<category><![CDATA[AI hacking]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34187</guid>

					<description><![CDATA[<p>A recent The New York Times report highlights how artificial intelligence is rapidly reshaping the cybersecurity landscape, particularly in the hands of hackers. Rather than introducing entirely new attack techniques, AI is acting as a force multiplier, enabling cybercriminals to execute existing methods faster, cheaper, and at a much larger scale. One of the key [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/" data-wpel-link="internal" target="_blank">Hackers at Machine Speed: The AI Cybersecurity Reality</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34187</post-id>	</item>
		<item>
		<title>AI Security = API Security: The Case for Real-Time Enforcement</title>
		<link>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/</link>
					<comments>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 16:33:44 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Guardrails]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[API Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34175</guid>

					<description><![CDATA[<p>AI Governance That Actually Works: Why Real-Time Enforcement Is the Missing Layer AI governance is everywhere right now—frameworks, policies, and documentation are rapidly evolving. But there’s a hard truth most organizations are starting to realize: Governance without enforcement is just intent. What separates mature AI security programs from the rest is the ability to enforce [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/" data-wpel-link="internal" target="_blank">AI Security = API Security: The Case for Real-Time Enforcement</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34175</post-id>	</item>
	</channel>
</rss>