<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:georss="http://www.georss.org/georss" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>DISC Infosec blog</title>
	<atom:link href="http://blog.deurainfosec.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://blog.deurainfosec.com/</link>
	<description>Dedicated to information security assurance&#13;
Information Security subject matter with related items</description>
	<lastBuildDate>Sat, 16 May 2026 18:11:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://blog.deurainfosec.com/wp-content/uploads/2023/05/disc-logo-144x144.jpg</url>
	<title>DISC InfoSec blog</title>
	<link>https://blog.deurainfosec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">7400975</site>	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>METATRON: Open-Source, Air-Gapped, Audit-Ready AI Pentesting</title>
		<link>https://blog.deurainfosec.com/metatron-open-source-air-gapped-audit-ready-ai-pentesting/</link>
					<comments>https://blog.deurainfosec.com/metatron-open-source-air-gapped-audit-ready-ai-pentesting/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Sat, 16 May 2026 18:06:16 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Pen Test]]></category>
		<category><![CDATA[AI Pentesting]]></category>
		<category><![CDATA[Air gapped]]></category>
		<category><![CDATA[MetaTron]]></category>
		<category><![CDATA[Open source]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35271</guid>

					<description><![CDATA[<p>METATRON: The First Practical Glimpse of Local-AI Penetration Testing — And Why AI Governance Teams Should Care An InfoSec, compliance, and AI governance perspective from DISC InfoSec In our recent post &#8220;Why Run LLMs Locally? The Future of Private Enterprise AI&#8221;, we made the case that the next phase of enterprise AI maturity will be [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/metatron-open-source-air-gapped-audit-ready-ai-pentesting/" data-wpel-link="internal" target="_blank">METATRON: Open-Source, Air-Gapped, Audit-Ready AI Pentesting</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/metatron-open-source-air-gapped-audit-ready-ai-pentesting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35271</post-id>	</item>
		<item>
		<title>AI Governance and Cybersecurity: Designing for the Inevitable Attack</title>
		<link>https://blog.deurainfosec.com/ai-governance-and-cybersecurity-designing-for-the-inevitable-attack/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-and-cybersecurity-designing-for-the-inevitable-attack/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Fri, 15 May 2026 16:39:46 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI Governance and Cybersecurity]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35255</guid>

					<description><![CDATA[<p>In today’s cybersecurity and AI governance landscape, resilience is not built on optimism — it is built on preparedness. A core principle echoed throughout modern security frameworks is that organizations should never rely on the assumption that threats will not materialize. Instead, they must invest in the readiness, controls, and governance structures necessary to withstand [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-and-cybersecurity-designing-for-the-inevitable-attack/" data-wpel-link="internal" target="_blank">AI Governance and Cybersecurity: Designing for the Inevitable Attack</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-and-cybersecurity-designing-for-the-inevitable-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35255</post-id>	</item>
		<item>
		<title>Why Run LLMs Locally? The Future of Private Enterprise AI</title>
		<link>https://blog.deurainfosec.com/why-run-llms-locally-the-future-of-private-enterprise-ai/</link>
					<comments>https://blog.deurainfosec.com/why-run-llms-locally-the-future-of-private-enterprise-ai/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 14 May 2026 14:36:49 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[LLMs Locally]]></category>
		<category><![CDATA[Local LLM]]></category>
		<category><![CDATA[MetaTron]]></category>
		<category><![CDATA[Private AI]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35205</guid>

					<description><![CDATA[<p>Why Local LLMs Matter for Security, Privacy, and AI Governance &#8211; Make sure to check out METATRON in the final thoughts section. Artificial Intelligence is rapidly becoming part of everyday business operations. From drafting policies and summarizing meetings to analyzing contracts and automating workflows, Large Language Models (LLMs) are now embedded into enterprise decision-making. But [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/why-run-llms-locally-the-future-of-private-enterprise-ai/" data-wpel-link="internal" target="_blank">Why Run LLMs Locally? The Future of Private Enterprise AI</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/why-run-llms-locally-the-future-of-private-enterprise-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35205</post-id>	</item>
		<item>
		<title>AI Model Risk Management Is Becoming the Foundation of Enterprise AI Governance</title>
		<link>https://blog.deurainfosec.com/ai-model-risk-management-is-becoming-the-foundation-of-enterprise-ai-governance/</link>
					<comments>https://blog.deurainfosec.com/ai-model-risk-management-is-becoming-the-foundation-of-enterprise-ai-governance/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 13 May 2026 16:42:02 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[AI Model Risk Management]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35121</guid>

					<description><![CDATA[<p>As enterprise AI adoption accelerates, AI Model Risk Management is rapidly becoming one of the most important disciplines in modern governance, risk, and compliance programs. Organizations are no longer experimenting with isolated AI models — they are deploying AI across critical business operations, customer interactions, analytics, automation, and decision-making systems. With that scale comes a [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-model-risk-management-is-becoming-the-foundation-of-enterprise-ai-governance/" data-wpel-link="internal" target="_blank">AI Model Risk Management Is Becoming the Foundation of Enterprise AI Governance</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-model-risk-management-is-becoming-the-foundation-of-enterprise-ai-governance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35121</post-id>	</item>
		<item>
		<title>Sun Tzu for the AI Governance Era: 7 Strategic Rules for InfoSec and Compliance Leaders</title>
		<link>https://blog.deurainfosec.com/sun-tzu-for-the-ai-governance-era-7-strategic-rules-for-infosec-and-compliance-leaders/</link>
					<comments>https://blog.deurainfosec.com/sun-tzu-for-the-ai-governance-era-7-strategic-rules-for-infosec-and-compliance-leaders/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 12 May 2026 16:49:34 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Compliance]]></category>
		<category><![CDATA[Sun Tzu]]></category>
		<category><![CDATA[Sun Tzu of AI Governance]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35159</guid>

					<description><![CDATA[<p>Sun Tzu for the AI Governance Era: 7 Strategic Rules for InfoSec and Compliance Leaders Most people treat strategy as a deliverable. A roadmap, a Gantt chart, a board slide with quarterly milestones. Sun Tzu would have laughed. Twenty-five centuries ago he understood what we keep forgetting: strategy isn&#8217;t the plan — it&#8217;s how you [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/sun-tzu-for-the-ai-governance-era-7-strategic-rules-for-infosec-and-compliance-leaders/" data-wpel-link="internal" target="_blank">Sun Tzu for the AI Governance Era: 7 Strategic Rules for InfoSec and Compliance Leaders</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/sun-tzu-for-the-ai-governance-era-7-strategic-rules-for-infosec-and-compliance-leaders/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35159</post-id>	</item>
		<item>
		<title>Your Shadow AI Inventory Is Wrong. Here’s a Free Way to Fix It.</title>
		<link>https://blog.deurainfosec.com/your-shadow-ai-inventory-is-wrong-heres-a-free-way-to-fix-it/</link>
					<comments>https://blog.deurainfosec.com/your-shadow-ai-inventory-is-wrong-heres-a-free-way-to-fix-it/#comments</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 11 May 2026 21:33:45 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Shadow AI]]></category>
		<category><![CDATA[Shadow AI Inventory]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35146</guid>

					<description><![CDATA[<p>Your Shadow AI Inventory Is Wrong. Here&#8217;s a Free Way to Fix It. If I asked your CISO or DPO today, &#8220;What&#8217;s the complete list of AI tools touching company or customer data?&#8221; — what would they hand you? In most B2B SaaS and financial services orgs I work with, the answer is a stale [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/your-shadow-ai-inventory-is-wrong-heres-a-free-way-to-fix-it/" data-wpel-link="internal" target="_blank">Your Shadow AI Inventory Is Wrong. Here&#8217;s a Free Way to Fix It.</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/your-shadow-ai-inventory-is-wrong-heres-a-free-way-to-fix-it/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35146</post-id>	</item>
		<item>
		<title>The AI Agent Identity Crisis Has Already Started</title>
		<link>https://blog.deurainfosec.com/the-ai-agent-identity-crisis-has-already-started/</link>
					<comments>https://blog.deurainfosec.com/the-ai-agent-identity-crisis-has-already-started/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 11 May 2026 15:30:36 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Agent]]></category>
		<category><![CDATA[AI Agent Identity]]></category>
		<category><![CDATA[Descope]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35126</guid>

					<description><![CDATA[<p>The AI Agent Identity Crisis Has Already Started The enterprise AI security problem is no longer theoretical — it is already unfolding inside organizations at a much faster pace than governance teams can control. A recent discussion featuring Slavik Markovich and Rishi Bhargava from Descope highlighted a real-world example that perfectly captures the emerging risks [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-ai-agent-identity-crisis-has-already-started/" data-wpel-link="internal" target="_blank">The AI Agent Identity Crisis Has Already Started</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-ai-agent-identity-crisis-has-already-started/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35126</post-id>	</item>
		<item>
		<title>OWASP 2026 GenAI Risk Catalogue Signals a New Era of AI Security Governance</title>
		<link>https://blog.deurainfosec.com/owasp-2026-genai-risk-catalogue-signals-a-new-era-of-ai-security-governance/</link>
					<comments>https://blog.deurainfosec.com/owasp-2026-genai-risk-catalogue-signals-a-new-era-of-ai-security-governance/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Sun, 10 May 2026 17:18:31 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[AI Security Governance]]></category>
		<category><![CDATA[OWASP 2026 GenAI Risk Catalogue]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35113</guid>

					<description><![CDATA[<p>The newly released 2026 OWASP catalogue on GenAI data security risks highlights how rapidly the security landscape is evolving for organizations deploying LLMs, RAG pipelines, and agentic AI systems. Unlike traditional application security frameworks, this catalogue focuses specifically on the unique ways AI systems process, store, retrieve, and expose data across increasingly autonomous workflows. The [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/owasp-2026-genai-risk-catalogue-signals-a-new-era-of-ai-security-governance/" data-wpel-link="internal" target="_blank">&lt;strong&gt;OWASP 2026 GenAI Risk Catalogue Signals a New Era of AI Security Governance&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/owasp-2026-genai-risk-catalogue-signals-a-new-era-of-ai-security-governance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35113</post-id>	</item>
		<item>
		<title>Dirty Frag Explained: Chained Linux Kernel Flaws Deliver Root Access</title>
		<link>https://blog.deurainfosec.com/dirty-frag-explained-chained-linux-kernel-flaws-deliver-root-access/</link>
					<comments>https://blog.deurainfosec.com/dirty-frag-explained-chained-linux-kernel-flaws-deliver-root-access/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Fri, 08 May 2026 16:47:23 +0000</pubDate>
				<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Chained Linux Kernel Flaws]]></category>
		<category><![CDATA[Dirty Frag]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35050</guid>

					<description><![CDATA[<p>Dirty Frag: A Second Linux Privilege Escalation Crisis in Two Weeks Barely a week after the Copy Fail disclosure rattled Linux administrators, the kernel community is contending with another local privilege escalation chain — this one branded &#8220;Dirty Frag.&#8221; The disclosure landed on May 8, 2026, alongside a working proof-of-concept exploit, and it represents two [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/dirty-frag-explained-chained-linux-kernel-flaws-deliver-root-access/" data-wpel-link="internal" target="_blank">Dirty Frag Explained: Chained Linux Kernel Flaws Deliver Root Access</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/dirty-frag-explained-chained-linux-kernel-flaws-deliver-root-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35050</post-id>	</item>
		<item>
		<title>The AI Governance Triad: Why ISO 42001, NIST AI RMF, and the EU AI Act Are No Longer Optional</title>
		<link>https://blog.deurainfosec.com/the-ai-governance-triad-why-iso-42001-nist-ai-rmf-and-the-eu-ai-act-are-no-longer-optional/</link>
					<comments>https://blog.deurainfosec.com/the-ai-governance-triad-why-iso-42001-nist-ai-rmf-and-the-eu-ai-act-are-no-longer-optional/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 07 May 2026 17:15:28 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI Governance Triad]]></category>
		<category><![CDATA[AIMS]]></category>
		<category><![CDATA[EU AI Act]]></category>
		<category><![CDATA[NIST AI Risk Management Framework]]></category>
		<category><![CDATA[NIST AI RMF]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35026</guid>

					<description><![CDATA[<p>The AI Governance Triad: Why ISO 42001, NIST AI RMF, and the EU AI Act Are No Longer Optional Three frameworks, one imperative — and a closing window for organizations that want to lead rather than catch up. AI is being deployed inside enterprises faster than any technology in the last twenty years. Procurement is [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-ai-governance-triad-why-iso-42001-nist-ai-rmf-and-the-eu-ai-act-are-no-longer-optional/" data-wpel-link="internal" target="_blank">The AI Governance Triad: Why ISO 42001, NIST AI RMF, and the EU AI Act Are No Longer Optional</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-ai-governance-triad-why-iso-42001-nist-ai-rmf-and-the-eu-ai-act-are-no-longer-optional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35026</post-id>	</item>
		<item>
		<title>LinkedIn Job Scams Are Surging: Why Your Hiring Pipeline Is Now an Attack Surface</title>
		<link>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/</link>
					<comments>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 06 May 2026 20:25:38 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[InfoSec jobs]]></category>
		<category><![CDATA[InfoSec job scams]]></category>
		<category><![CDATA[job scams]]></category>
		<category><![CDATA[Linkedin job scams]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=35008</guid>

					<description><![CDATA[<p>LinkedIn has become the world’s default professional identity layer—but it’s now equally a high-value attack surface. The latest report highlights a sharp rise in job scams, with recruiter impersonation and fake roles eroding trust across the hiring ecosystem. When over a third of recruiters themselves report impersonation and candidates increasingly demand verification, we’re no longer [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/" data-wpel-link="internal" target="_blank">LinkedIn Job Scams Are Surging: Why Your Hiring Pipeline Is Now an Attack Surface</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/linkedin-job-scams-are-surging-why-your-hiring-pipeline-is-now-an-attack-surface/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">35008</post-id>	</item>
		<item>
		<title>AI Governance by Default, Not by Design: Who Actually Owns It in Your Organization?</title>
		<link>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 05 May 2026 16:16:43 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34965</guid>

					<description><![CDATA[<p>Who Actually Owns AI Governance? An InfoSec &#38; AI Governance Reading of the IAPP Conversation The IAPP&#8217;s Ashley Casovan, in a recent AdExchanger interview, surfaces what is quickly becoming the most uncomfortable question inside enterprise compliance functions: when an AI tool is deployed, who actually owns the governance of it? Privacy teams have spent years [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/" data-wpel-link="internal" target="_blank">AI Governance by Default, Not by Design: Who Actually Owns It in Your Organization?</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-by-default-not-by-design-who-actually-owns-it-in-your-organization/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34965</post-id>	</item>
		<item>
		<title>The Adversary Already Adopted AI. Did Your Defense?</title>
		<link>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/</link>
					<comments>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 21:02:29 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[Adversary]]></category>
		<category><![CDATA[Nation State]]></category>
		<category><![CDATA[Nation-State]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34895</guid>

					<description><![CDATA[<p>Defenders Coordinate Slowly. Adversaries Move at Machine Speed. Microsoft just confirmed what every CISO has been quietly bracing for: Nation-state cyber programs are now running on AI — and they&#8217;re moving at machine speed. In a sharp new interview with Help Net Security, Microsoft&#8217;s Kaja Ciglic (Senior Director, Cybersecurity Policy &#38; Diplomacy) lays out the [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/" data-wpel-link="internal" target="_blank">The Adversary Already Adopted AI. Did Your Defense?</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/the-adversary-already-adopted-ai-did-your-defense/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34895</post-id>	</item>
		<item>
		<title>When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call</title>
		<link>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/</link>
					<comments>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 17:09:13 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI Company]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34883</guid>

					<description><![CDATA[<p>When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call In the span of a single week, Anthropic — arguably the most safety-conscious AI company in the industry — experienced two back-to-back operational governance failures. Neither was a sophisticated breach. The first involved draft materials for an unreleased model (now public as [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/" data-wpel-link="internal" target="_blank">When the Most Safety-Focused AI Company Misses the Basics: A Governance Wake-Up Call</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/when-the-most-safety-focused-ai-company-misses-the-basics-a-governance-wake-up-call/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34883</post-id>	</item>
		<item>
		<title>Claude Security Goes Public: A Turning Point for AI-Driven DevSecOps—and a New Governance Challenge</title>
		<link>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/</link>
					<comments>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 04 May 2026 16:31:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[Claude Mythos]]></category>
		<category><![CDATA[Claude security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34878</guid>

					<description><![CDATA[<p>Anthropic has expanded access to its AI-driven security capability, Claude Security, moving it into a broader public beta for enterprise users. The solution is designed to help organizations identify vulnerabilities in their codebases and automatically generate remediation fixes, signaling a shift toward AI-assisted secure software development at scale. At its core, Claude Security applies advanced [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Claude Security Goes Public: A Turning Point for AI-Driven DevSecOps—and a New Governance Challenge&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/claude-security-goes-public-a-turning-point-for-ai-driven-devsecops-and-a-new-governance-challenge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34878</post-id>	</item>
	</channel>
</rss>