<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:georss="http://www.georss.org/georss" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>DISC Infosec blog</title>
	<atom:link href="http://blog.deurainfosec.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://blog.deurainfosec.com/</link>
	<description>Dedicated to information security assurance&#13;
Information Security subject matter with related items</description>
	<lastBuildDate>Wed, 06 May 2026 20:32:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://blog.deurainfosec.com/wp-content/uploads/2023/05/disc-logo-144x144.jpg</url>
	<title>DISC InfoSec blog</title>
	<link>https://blog.deurainfosec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">7400975</site>	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>LinkedIn Job Scams Are Surging: Why Your Hiring Pipeline Is Now an Attack Surface</title>
		<link>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/</link>
					<comments>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 06 May 2026 20:25:38 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[InfoSec jobs]]></category>
		<category><![CDATA[InfoSec job scams]]></category>
		<category><![CDATA[job scams]]></category>
		<category><![CDATA[Linkedin job scams]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35008</guid>

					<description><![CDATA[<p>LinkedIn has become the world’s default professional identity layer—but it’s now equally a high-value attack surface. The latest report highlights a sharp rise in job scams, with recruiter impersonation and fake roles eroding trust across the hiring ecosystem. When over a third of recruiters themselves report impersonation and candidates increasingly demand verification, we’re no longer [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/" data-wpel-link="internal" target="_blank">LinkedIn Job Scams Are Surging: Why Your Hiring Pipeline Is Now an Attack Surface</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35008</post-id>	</item>
		<item>
		<title>AI Governance by Default, Not by Design: Who Actually Owns It in Your Organization?</title>
		<link>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 05 May 2026 16:16:43 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34965</guid>

					<description><![CDATA[<p>Who Actually Owns AI Governance? An InfoSec &#38; AI Governance Reading of the IAPP Conversation The IAPP&#8217;s Ashley Casovan, in a recent AdExchanger interview, surfaces what is quickly becoming the most uncomfortable question inside enterprise compliance functions: when an AI tool is deployed, who actually owns the governance of it? Privacy teams have spent years [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/" data-wpel-link="internal" target="_blank">AI Governance by Default, Not by Design: Who Actually Owns It in Your Organization?</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34965</post-id>	</item>
		<item>
		<title>The Adversary Already Adopted AI. Did Your Defense?</title>
		<link>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/</link>
					<comments>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 21:02:29 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[Adversary]]></category>
		<category><![CDATA[Nation State]]></category>
		<category><![CDATA[Nation-State]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34895</guid>

					<description><![CDATA[<p>Defenders Coordinate Slowly. Adversaries Move at Machine Speed. Microsoft just confirmed what every CISO has been quietly bracing for: Nation-state cyber programs are now running on AI — and they&#8217;re moving at machine speed. In a sharp new interview with Help Net Security, Microsoft&#8217;s Kaja Ciglic (Senior Director, Cybersecurity Policy &#38; Diplomacy) lays out the [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/" data-wpel-link="internal" target="_blank">The Adversary Already Adopted AI. Did Your Defense?</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34895</post-id>	</item>
		<item>
		<title>When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call</title>
		<link>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/</link>
					<comments>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 17:09:13 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI Company]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34883</guid>

					<description><![CDATA[<p>When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call In the span of a single week, Anthropic — arguably the most safety-conscious AI company in the industry — experienced two back-to-back operational governance failures. Neither was a sophisticated breach. The first involved draft materials for an unreleased model (now public as [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/" data-wpel-link="internal" target="_blank">When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34883</post-id>	</item>
		<item>
		<title>Claude Security Goes Public: A Turning Point for AI-Driven DevSecOps—and a New Governance Challenge</title>
		<link>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/</link>
					<comments>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 16:31:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[Claude Mythos]]></category>
		<category><![CDATA[Claude security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34878</guid>

					<description><![CDATA[<p>Anthropic has expanded access to its AI-driven security capability, Claude Security, moving it into a broader public beta for enterprise users. The solution is designed to help organizations identify vulnerabilities in their codebases and automatically generate remediation fixes, signaling a shift toward AI-assisted secure software development at scale. At its core, Claude Security applies advanced [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Claude Security Goes Public: A Turning Point for AI-Driven DevSecOps—and a New Governance Challenge&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34878</post-id>	</item>
		<item>
		<title>The AI Oversight Gap: When Confidence Outpaces Control</title>
		<link>https://blog.deurainfosec.com/the-ai-oversight-gap-when-confidence-outpaces-control/</link>
					<comments>https://blog.deurainfosec.com/the-ai-oversight-gap-when-confidence-outpaces-control/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:24:07 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Guardrails]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI Oversight Gap]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34817</guid>

					<description><![CDATA[<p>The AI Oversight Gap: When Adoption Outpaces Governance AI has quietly graduated from pilot project to production infrastructure. It&#8217;s writing code, drafting contracts, screening candidates, and processing customer data across functions most organizations couldn&#8217;t fully map if asked. The technology has scaled. The governance hasn&#8217;t. New research spanning more than 800 GRC, audit, and IT [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-ai-oversight-gap-when-confidence-outpaces-control/" data-wpel-link="internal" target="_blank">The AI Oversight Gap: When Confidence Outpaces Control</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-ai-oversight-gap-when-confidence-outpaces-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34817</post-id>	</item>
		<item>
		<title>The AI Governance Quick-Start: Defensible in 10 Days, Not 4 Quarters</title>
		<link>https://blog.deurainfosec.com/the-ai-governance-quick-start-defensible-in-10-days-not-4-quarters/</link>
					<comments>https://blog.deurainfosec.com/the-ai-governance-quick-start-defensible-in-10-days-not-4-quarters/#comments</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 17:52:09 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[AI Acceptable Use Policy]]></category>
		<category><![CDATA[AI Security Risk Assessment]]></category>
		<category><![CDATA[Shadow AI Inventory]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34767</guid>

					<description><![CDATA[<p>The AI Governance Quick-Start: Defensible in 10 Days, Not 4 Quarters AI governance doesn’t fail because of frameworks—it fails because it never starts. The AI Governance Quick-Start changes that. In just 7–10 business days, you move from uncertainty to a defensible position aligned with NIST AI Risk Management Framework, EU AI Act, and ISO/IEC 42001—without [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-ai-governance-quick-start-defensible-in-10-days-not-4-quarters/" data-wpel-link="internal" target="_blank">The AI Governance Quick-Start: Defensible in 10 Days, Not 4 Quarters</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-ai-governance-quick-start-defensible-in-10-days-not-4-quarters/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34767</post-id>	</item>
		<item>
		<title>AI Security Tool Evaluation: A Reality Check for CISOs</title>
		<link>https://blog.deurainfosec.com/ai-security-tool-evaluation-a-reality-check-for-cisos/</link>
					<comments>https://blog.deurainfosec.com/ai-security-tool-evaluation-a-reality-check-for-cisos/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 16:15:43 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Tools]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[AI Security Tool]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34701</guid>

					<description><![CDATA[<p>AI Security Tool Evaluation: A Reality Check for CISOs Artificial intelligence is fundamentally reshaping how applications are built, deployed, and attacked. Unlike traditional systems, AI introduces a dynamic and unpredictable attack surface—especially with the rise of agentic AI that can act autonomously. This shift demands a completely new approach to security evaluation. Most organizations are [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-security-tool-evaluation-a-reality-check-for-cisos/" data-wpel-link="internal" target="_blank">AI Security Tool Evaluation: A Reality Check for CISOs</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-security-tool-evaluation-a-reality-check-for-cisos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34701</post-id>	</item>
		<item>
		<title>How to Answer AI Questions on Your Vendor Assessment (Without Stalling the Deal)</title>
		<link>https://blog.deurainfosec.com/how-to-answer-ai-questions-on-your-vendor-assessment-without-stalling-the-deal/</link>
					<comments>https://blog.deurainfosec.com/how-to-answer-ai-questions-on-your-vendor-assessment-without-stalling-the-deal/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 02:24:54 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Vendor Assessment]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34743</guid>

					<description><![CDATA[<p>How to Answer AI Questions on Your Vendor Assessment (Without Stalling the Deal) Eighteen months ago, &#8220;Do you use AI?&#8221; was a footnote on a vendor questionnaire. Today it is a deal-blocker. Procurement teams at banks, healthcare systems, and even mid-market SaaS buyers now routinely send 40 to 80 AI-specific questions before signing a contract. [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/how-to-answer-ai-questions-on-your-vendor-assessment-without-stalling-the-deal/" data-wpel-link="internal" target="_blank">How to Answer AI Questions on Your Vendor Assessment (Without Stalling the Deal)</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/how-to-answer-ai-questions-on-your-vendor-assessment-without-stalling-the-deal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34743</post-id>	</item>
		<item>
		<title>Most AI Security Tools Won’t Pass an Audit. Here’s a 15-Minute Way to Find Out.</title>
		<link>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out-2/</link>
					<comments>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out-2/#comments</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 20:26:52 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34730</guid>

					<description><![CDATA[<p>Most AI Security Tools Won&#8217;t Pass an Audit. Here&#8217;s a 15-Minute Way to Find Out. An effective CISO-grade scorecard that puts your AI security tool through the questions an assessor will actually ask — and maps every gap to NIST AI RMF and ISO 42001. Walk into any AI security vendor demo and the choreography [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out-2/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Most AI Security Tools Won&#8217;t Pass an Audit. Here&#8217;s a 15-Minute Way to Find Out.&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out-2/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34730</post-id>	</item>
		<item>
		<title>Most AI Security Tools Won’t Pass an Audit. Here’s a 15-Minute Way to Find Out.</title>
		<link>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out/</link>
					<comments>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:37:40 +0000</pubDate>
				<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[Security Tools]]></category>
		<category><![CDATA[Ai security tool scorecard]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34704</guid>

					<description><![CDATA[<p>Most AI Security Tools Won&#8217;t Pass an Audit. Here&#8217;s a 15-Minute Way to Find Out. A free CISO-grade scorecard that puts your AI security tool through the questions an assessor will actually ask — and maps every gap to NIST AI RMF and ISO 42001. Walk into any AI security vendor demo and the choreography [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out/" data-wpel-link="internal" target="_blank">Most AI Security Tools Won’t Pass an Audit. Here’s a 15-Minute Way to Find Out.</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/most-ai-security-tools-wont-pass-an-audit-heres-a-15-minute-way-to-find-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34704</post-id>	</item>
		<item>
		<title>AI Governance in the Age of Mythos: Why Small Business Owners Can’t Afford to Wait</title>
		<link>https://blog.deurainfosec.com/ai-governance-in-the-age-of-mythos-why-small-business-owners-cant-afford-to-wait/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-in-the-age-of-mythos-why-small-business-owners-cant-afford-to-wait/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 14:30:27 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[Age of Mythos]]></category>
		<category><![CDATA[SMBs]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34660</guid>

					<description><![CDATA[<p>AI Governance in the Age of Mythos: Why Small Business Owners Can&#8217;t Afford to Wait We are living in the age of mythos. Every week brings a new AI story: the tool that will replace your accountant, the chatbot that cost a company $10,000 in refunds, the startup that 10x&#8217;d its revenue with a single [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-in-the-age-of-mythos-why-small-business-owners-cant-afford-to-wait/" data-wpel-link="internal" target="_blank">AI Governance in the Age of Mythos: Why Small Business Owners Can&#8217;t Afford to Wait</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-in-the-age-of-mythos-why-small-business-owners-cant-afford-to-wait/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34660</post-id>	</item>
		<item>
		<title>Why ISO 27701 Is No Longer Optional: A Privacy Wake-Up Call for U.S. Small Business Owners</title>
		<link>https://blog.deurainfosec.com/why-iso-27701-is-no-longer-optional-a-privacy-wake-up-call-for-u-s-small-business-owners/</link>
					<comments>https://blog.deurainfosec.com/why-iso-27701-is-no-longer-optional-a-privacy-wake-up-call-for-u-s-small-business-owners/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 18:28:50 +0000</pubDate>
				<category><![CDATA[Information Privacy]]></category>
		<category><![CDATA[ISO 27k]]></category>
		<category><![CDATA[NIST Privacy]]></category>
		<category><![CDATA[Security and privacy Law]]></category>
		<category><![CDATA[ISO 27701]]></category>
		<category><![CDATA[PIMS]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34687</guid>

					<description><![CDATA[<p>Why ISO 27701 Is No Longer Optional: A Privacy Wake-Up Call for U.S. Small Business Owners By DISC InfoSec &#124; Privacy &#38; AI Governance Practitioners We are living in the age of AI, where every customer interaction generates data, every SaaS tool ingests it, and every chatbot, CRM, and marketing automation platform processes it in [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/why-iso-27701-is-no-longer-optional-a-privacy-wake-up-call-for-u-s-small-business-owners/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Why ISO 27701 Is No Longer Optional: A Privacy Wake-Up Call for U.S. Small Business Owners&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/why-iso-27701-is-no-longer-optional-a-privacy-wake-up-call-for-u-s-small-business-owners/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34687</post-id>	</item>
		<item>
		<title>AI Governance That Works: From Frameworks to Audit-Ready Controls with DISC</title>
		<link>https://blog.deurainfosec.com/ai-governance-that-works-from-frameworks-to-audit-ready-controls-with-disc/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-that-works-from-frameworks-to-audit-ready-controls-with-disc/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 20:08:49 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Guardrails]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34642</guid>

					<description><![CDATA[<p>The executive AI governance positions AI not just as a technology shift, but as a strategic business transformation that requires structured oversight. It emphasizes that organizations must balance innovation with risk by embedding governance into how AI is designed, deployed, and monitored—not as an afterthought, but as a core operating principle. At its foundation, the [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-that-works-from-frameworks-to-audit-ready-controls-with-disc/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI Governance That Works: From Frameworks to Audit-Ready Controls with DISC&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-that-works-from-frameworks-to-audit-ready-controls-with-disc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34642</post-id>	</item>
		<item>
		<title>The 2026 AI Compliance Checklist: 60 Controls Across 10 Domains</title>
		<link>https://blog.deurainfosec.com/the-2026-ai-compliance-checklist-60-controls-across-10-domains/</link>
					<comments>https://blog.deurainfosec.com/the-2026-ai-compliance-checklist-60-controls-across-10-domains/#comments</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 17:27:32 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[The 2026 AI Compliance Checklist]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34632</guid>

					<description><![CDATA[<p>Published by DISC InfoSec · AI Governance &#38; Cybersecurity The 2026 AI Compliance Checklist: 60 Controls Across 10 Domains If you run security, compliance, or AI at a B2B SaaS or financial services company, you have probably noticed something uncomfortable in the last six months: every framework you used to live by has grown an [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-2026-ai-compliance-checklist-60-controls-across-10-domains/" data-wpel-link="internal" target="_blank">The 2026 AI Compliance Checklist: 60 Controls Across 10 Domains</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-2026-ai-compliance-checklist-60-controls-across-10-domains/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34632</post-id>	</item>
	</channel>
</rss>