<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:georss="http://www.georss.org/georss" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>DISC Infosec blog</title>
	<atom:link href="http://blog.deurainfosec.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://blog.deurainfosec.com/</link>
	<description>Dedicated to information security assurance&#13;
Information Security subject matter with related items</description>
	<lastBuildDate>Mon, 13 Apr 2026 15:41:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://blog.deurainfosec.com/wp-content/uploads/2023/05/disc-logo-144x144.jpg</url>
	<title>DISC InfoSec blog</title>
	<link>https://blog.deurainfosec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">7400975</site>	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>AI Attack Surface ScoreCard</title>
		<link>https://blog.deurainfosec.com/ai-attack-surface-scorecard/</link>
					<comments>https://blog.deurainfosec.com/ai-attack-surface-scorecard/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 15:31:34 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI Attack Surface]]></category>
		<category><![CDATA[AI Attack Surface ScoreCard]]></category>
		<category><![CDATA[AI Scorecard]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34302</guid>

					<description><![CDATA[<p>Uncover where your AI systems are truly vulnerable—before attackers do. The AI Attack Surface Scorecard is a powerful, rapid 20-question assessment that pinpoints how your AI models, agents, and automated workflows can be exploited across critical domains like prompt injection, model access, data leakage, and supply chain risk. Built with real-world threat scenarios, it delivers [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-attack-surface-scorecard/" data-wpel-link="internal" target="_blank">AI Attack Surface ScoreCard</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-attack-surface-scorecard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34302</post-id>	</item>
		<item>
		<title>AI-Accelerated Offense: Why Security Programs Must Move Now, Not Later</title>
		<link>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/</link>
					<comments>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 21:30:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Security Professional]]></category>
		<category><![CDATA[Security program]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[AI Offence]]></category>
		<category><![CDATA[AI-Accelerated Offense]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34292</guid>

					<description><![CDATA[<p>Preparing a security program for AI-accelerated offense means accepting a hard reality: within the next couple of years, AI will uncover a significant portion of the vulnerabilities currently hidden in your code—and not always before attackers do. The advantage shifts to organizations that act now by operating at machine speed. That means making 24-hour patching [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI-Accelerated Offense: Why Security Programs Must Move Now, Not Later&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-accelerated-offense-why-security-programs-must-move-now-not-later/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34292</post-id>	</item>
		<item>
		<title>AI Governance Explained: Accountability, Trust, and Control in the Age of AI</title>
		<link>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 20:52:05 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34268</guid>

					<description><![CDATA[<p>AI isn’t a tech problem—it’s about ownership, accountability, and trust at scale. AI Governance AI governance is about setting clear rules for how AI uses data, assigning accountability for every decision it makes, and ensuring you can trace and explain outcomes—especially when something goes wrong. It’s not complex in principle: define what AI is allowed [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI Governance Explained: Accountability, Trust, and Control in the Age of AI&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-explained-accountability-trust-and-control-in-the-age-of-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34268</post-id>	</item>
		<item>
		<title>Measure What Matters: Security &amp; AI Readiness Scorecard</title>
		<link>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/</link>
					<comments>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 17:28:21 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 27k]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[NIST CSF]]></category>
		<category><![CDATA[AI Readiness Scorecard]]></category>
		<category><![CDATA[Risk scorecard]]></category>
		<category><![CDATA[Security Readiness Scorecard]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34240</guid>

					<description><![CDATA[<p>From Chaos to Confidence: Your 30-Minute Security &#38; AI Risk Scorecard Most security leaders focus on tools, frameworks, and compliance. But the real differentiator? Mindset. “I am whole, perfect, strong, powerful, loving, harmonious, and happy.” This isn’t just an affirmation from Charles Fillmore—it’s a blueprint for modern security leadership. Because cybersecurity is not just a [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/" data-wpel-link="internal" target="_blank">Measure What Matters: Security &amp; AI Readiness Scorecard</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/measure-what-matters-security-ai-readiness-scorecard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34240</post-id>	</item>
		<item>
		<title>Security Is a People Problem: Culture, Behavior, and Decisions Drive Cyber Resilience</title>
		<link>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/</link>
					<comments>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 20:15:31 +0000</pubDate>
				<category><![CDATA[Cyber resilience]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Is a People Problem]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34221</guid>

					<description><![CDATA[<p>How Security Is, First and Foremost, a People Issue At its core, security depends on human behavior—how people design systems, configure controls, respond to threats, and make daily decisions. Technology can enforce rules and automate defenses, but humans create, manage, and sometimes bypass those controls. Most incidents—whether phishing, misconfigurations, or insider actions—originate from human choices. [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Security Is a People Problem: Culture, Behavior, and Decisions Drive Cyber Resilience&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/security-is-a-people-problem-culture-behavior-and-decisions-drive-cyber-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34221</post-id>	</item>
		<item>
		<title>Security Driven by Business Value: Focus, Prioritize, Protect What Matters Most</title>
		<link>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/</link>
					<comments>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 17:27:38 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[vCISO]]></category>
		<category><![CDATA[Security Driven by Business]]></category>
		<category><![CDATA[Security Support Mission]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34210</guid>

					<description><![CDATA[<p>How “Security Must Be Driven by Business Need” Is Accomplished This is achieved by tightly aligning security strategy with business objectives, revenue drivers, and operational priorities. Instead of applying controls uniformly, organizations perform risk-based assessments tied to critical business processes, assets, and data flows. Security leaders collaborate with executives to understand what truly impacts revenue, [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Security Driven by Business Value: Focus, Prioritize, Protect What Matters Most&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/security-driven-by-business-value-focus-prioritize-protect-what-matters-most/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34210</post-id>	</item>
		<item>
		<title>Claude Mythos and the Future of Cybersecurity: Powerful—and Potentially Dangerous</title>
		<link>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/</link>
					<comments>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 22:22:45 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Governance Tools]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Claude Mythos]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34195</guid>

					<description><![CDATA[<p>Too Powerful to Release? The AI Model That’s Exposing Hidden Cyber Risk This development is one that deserves close attention. Anthropic has introduced Project Glasswing, a new industry coalition that brings together major players across technology and financial services. At the center of this initiative is a highly advanced frontier model known as Claude Mythos [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/" data-wpel-link="internal" target="_blank">Claude Mythos and the Future of Cybersecurity: Powerful—and Potentially Dangerous</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/claude-mythos-and-the-future-of-cybersecurity-powerful-and-potentially-dangerous/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34195</post-id>	</item>
		<item>
		<title>Hackers at Machine Speed: The AI Cybersecurity Reality</title>
		<link>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/</link>
					<comments>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 20:44:42 +0000</pubDate>
				<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI force multiplier]]></category>
		<category><![CDATA[AI hacking]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34187</guid>

					<description><![CDATA[<p>A recent The New York Times report highlights how artificial intelligence is rapidly reshaping the cybersecurity landscape, particularly in the hands of hackers. Rather than introducing entirely new attack techniques, AI is acting as a force multiplier, enabling cybercriminals to execute existing methods faster, cheaper, and at a much larger scale. One of the key [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/" data-wpel-link="internal" target="_blank">Hackers at Machine Speed: The AI Cybersecurity Reality</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/hackers-at-machine-speed-the-ai-cybersecurity-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34187</post-id>	</item>
		<item>
		<title>AI Security = API Security: The Case for Real-Time Enforcement</title>
		<link>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/</link>
					<comments>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 16:33:44 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[AI Guardrails]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[API Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34175</guid>

					<description><![CDATA[<p>AI Governance That Actually Works: Why Real-Time Enforcement Is the Missing Layer AI governance is everywhere right now—frameworks, policies, and documentation are rapidly evolving. But there’s a hard truth most organizations are starting to realize: Governance without enforcement is just intent. What separates mature AI security programs from the rest is the ability to enforce [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/" data-wpel-link="internal" target="_blank">AI Security = API Security: The Case for Real-Time Enforcement</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-security-api-security-the-case-for-real-time-enforcement/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34175</post-id>	</item>
		<item>
		<title>Is Your AI Governance Strategy Audit-Ready—or Just Documented?</title>
		<link>https://blog.deurainfosec.com/is-your-ai-governance-strategy-audit-ready-or-just-documented/</link>
					<comments>https://blog.deurainfosec.com/is-your-ai-governance-strategy-audit-ready-or-just-documented/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 18:16:13 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO 42001]]></category>
		<category><![CDATA[EU AI Act]]></category>
		<category><![CDATA[NIST AI RMF]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34154</guid>

					<description><![CDATA[<p>1. The Audit Question Organizations Must AnswerIs your AI governance strategy ready for audit? This is no longer a theoretical concern. As AI adoption accelerates, organizations are being evaluated not just on innovation, but on how well they govern, control, and document their AI systems. 2. AI Governance Is No Longer OptionalAI governance has shifted [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/is-your-ai-governance-strategy-audit-ready-or-just-documented/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Is Your AI Governance Strategy Audit-Ready—or Just Documented?&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/is-your-ai-governance-strategy-audit-ready-or-just-documented/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34154</post-id>	</item>
		<item>
		<title>AI-Native Risk: Why AI Security Is Still an API Security Problem</title>
		<link>https://blog.deurainfosec.com/ai-native-risk-why-ai-security-is-still-an-api-security-problem/</link>
					<comments>https://blog.deurainfosec.com/ai-native-risk-why-ai-security-is-still-an-api-security-problem/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 16:29:59 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<category><![CDATA[API security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[API Security]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34138</guid>

					<description><![CDATA[<p>1. Defining Risk in AI-Native SystemsAI-native systems introduce a new class of risk driven by autonomy, scale, and complexity. Unlike traditional applications, these systems rely on dynamic decision-making, continuous learning, and interconnected services. As a result, risks are no longer confined to static vulnerabilities—they emerge from unpredictable behaviors, opaque logic, and rapidly evolving interactions across [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-native-risk-why-ai-security-is-still-an-api-security-problem/" data-wpel-link="internal" target="_blank">&lt;strong&gt;AI-Native Risk: Why AI Security Is Still an API Security Problem&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-native-risk-why-ai-security-is-still-an-api-security-problem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34138</post-id>	</item>
		<item>
		<title>AI Governance Enforcement: The Foundation for Scaling AI Governance Effectively</title>
		<link>https://blog.deurainfosec.com/ai-governance-enforcement-the-foundation-for-scaling-ai-governance-effectively/</link>
					<comments>https://blog.deurainfosec.com/ai-governance-enforcement-the-foundation-for-scaling-ai-governance-effectively/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 22:22:30 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[AI Governance Enforcement]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34102</guid>

					<description><![CDATA[<p>AI Governance Enforcement AI governance enforcement is the operational layer that turns policies into real-time controls across AI systems. Instead of relying on static documents or post-incident monitoring, enforcement evaluates every AI action—prompts, outputs, code, documents, and messages—against defined policies and either allows, blocks, or flags them instantly. This ensures that compliance, security, and ethical [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/ai-governance-enforcement-the-foundation-for-scaling-ai-governance-effectively/" data-wpel-link="internal" target="_blank">AI Governance Enforcement: The Foundation for Scaling AI Governance Effectively</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/ai-governance-enforcement-the-foundation-for-scaling-ai-governance-effectively/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34102</post-id>	</item>
		<item>
		<title>Securing LLM-Powered Enterprises: From Invisible Threats to Operational Resilience</title>
		<link>https://blog.deurainfosec.com/securing-llm-powered-enterprises-from-invisible-threats-to-operational-resilience/</link>
					<comments>https://blog.deurainfosec.com/securing-llm-powered-enterprises-from-invisible-threats-to-operational-resilience/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 16:16:16 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<category><![CDATA[Securing LLM]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34087</guid>

					<description><![CDATA[<p>Protecting an organization that relies heavily on LLMs starts with a mindset shift: you’re no longer just securing systems—you’re securing behavior. LLMs are probabilistic, adaptive, and highly dependent on data, which means traditional security controls alone are not enough. You need to understand how these systems think, fail, and can be manipulated. The first step [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/securing-llm-powered-enterprises-from-invisible-threats-to-operational-resilience/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Securing LLM-Powered Enterprises: From Invisible Threats to Operational Resilience&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/securing-llm-powered-enterprises-from-invisible-threats-to-operational-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34087</post-id>	</item>
		<item>
		<title>Cyber Resilience Maturity Model: From Reactive Security to Operational Resilience</title>
		<link>https://blog.deurainfosec.com/cyber-resilience-maturity-model-from-reactive-security-to-operational-resilience/</link>
					<comments>https://blog.deurainfosec.com/cyber-resilience-maturity-model-from-reactive-security-to-operational-resilience/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 19:15:59 +0000</pubDate>
				<category><![CDATA[Cyber resilience]]></category>
		<category><![CDATA[Cyber Resilience Maturity Model]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34077</guid>

					<description><![CDATA[<p>What is a Cyber Resilience Maturity Framework? A Cyber Resilience Maturity Framework is a structured model used to assess how well an organization can prevent, withstand, respond to, and recover from cyber incidents. It evaluates capabilities across people, process, and technology, and helps organizations move from reactive security to predictable, adaptive resilience. Maturity Levels (1–5) [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/cyber-resilience-maturity-model-from-reactive-security-to-operational-resilience/" data-wpel-link="internal" target="_blank">&lt;strong&gt;Cyber Resilience Maturity Model: From Reactive Security to Operational Resilience&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/cyber-resilience-maturity-model-from-reactive-security-to-operational-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34077</post-id>	</item>
		<item>
		<title>From Risk to Resilience: A 5-Step Playbook for Securing AI in the Modern Threat Era</title>
		<link>https://blog.deurainfosec.com/from-risk-to-resilience-a-5-step-playbook-for-securing-ai-in-the-modern-threat-era/</link>
					<comments>https://blog.deurainfosec.com/from-risk-to-resilience-a-5-step-playbook-for-securing-ai-in-the-modern-threat-era/#respond</comments>
		
		<dc:creator><![CDATA[disc7]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 18:46:36 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[AI resilience]]></category>
		<category><![CDATA[AI threats]]></category>
		<guid isPermaLink="false">https://blog.deurainfosec.com/?p=34055</guid>

					<description><![CDATA[<p>The AI cyber risk playbook outlines a structured, five-step approach to building cyber resilience in the face of rapidly evolving AI-driven threats. First, organizations must contextualize AI risk by identifying where and how AI is used—whether through shadow AI, third-party models, or internally developed systems—and understanding how each introduces new attack vectors. This step shifts [&#8230;]</p>
<p>The post <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com/from-risk-to-resilience-a-5-step-playbook-for-securing-ai-in-the-modern-threat-era/" data-wpel-link="internal" target="_blank">&lt;strong&gt;From Risk to Resilience: A 5-Step Playbook for Securing AI in the Modern Threat Era&lt;/strong&gt;</a> appeared first on <a rel="nofollow noopener noreferrer" href="https://blog.deurainfosec.com" data-wpel-link="internal" target="_blank">DISC InfoSec blog</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.deurainfosec.com/from-risk-to-resilience-a-5-step-playbook-for-securing-ai-in-the-modern-threat-era/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34055</post-id>	</item>
	</channel>
</rss>