Crypto companies canโt afford inexperienced marketers in a regulated era | Opinion
ISO 27001 is an internationally recognized standard that defines the requirements for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS) within an organization. First introduced in 1999, the standard has evolved through multiple revisions to address changing security needs. The most recent update, ISO 27001:2022, was released on October 25, 2022, [โฆ]
The post ISO 27001:2013 vs 2022 โ A Quick Comparison Guide appeared first on Kratikal Blogs.
The post ISO 27001:2013 vs 2022 โ A Quick Comparison Guide appeared first on Security Boulevard.
How Can AI Revolutionize Compliance Management? Are you leveraging AI technologies to optimize compliance management in your organization? Where compliance requirements continue to grow more complex across industries, the integration of Artificial Intelligence (AI) into compliance management is becoming increasingly essential. The call for efficient compliance management resonates especially with organizations operating in sectors such [โฆ]
The post Can AI manage compliance requirements efficiently? appeared first on Entro.
The post Can AI manage compliance requirements efficiently? appeared first on Security Boulevard.
Cyber regulations are where politics meets business โ where business becomes subject to political realities.
The post Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements appeared first on SecurityWeek.
For those of you who are like me, when I first heard about the new EU AI Act, I had flashbacks to the implementation of the General Data Protection Act (GDPR) back in 2018. There are certainly a lot of similarities with the EU leading the way in consumer protections that will likely lead to more, similar legislation across the globe.
How Can AI Revolutionize Cloud Security Management? How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in our IT infrastructure, the management of Non-Human Identities (NHIs) has emerged as a pivotal strategy [โฆ]
The post Can AI manage cloud security effectively? appeared first on Entro.
The post Can AI manage cloud security effectively? appeared first on Security Boulevard.
Enterprise-grade identity verification is critical for AI-driven businesses to prevent fraud, ensure compliance, and secure digital identities across onboarding, access control, and automated workflows.
The post Enterprise-Grade Identity Verification for AI-Enhanced Workflowsย appeared first on Security Boulevard.
It's now been a full calendar year since the European Union's Digital Operational Resilience Act (DORA) became enforceable in January 2025, marking a clear shift in how regulators expect organizations to manage digital risk.
The post What a Year of DORA Reveals About Cyber Resilience appeared first on Security Boulevard.
In Star Trek, the Kobayashi Maru simulation is an unwinnable test faced by Starfleet cadet captains. The only way to โwinโ is to accept that you canโt. Itโs a test of character โย forcing cadet captains to choose between impossible options and live with the consequences. In many ways, our roles as cybersecurity leaders is the..
The post The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience appeared first on Security Boulevard.
The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities.
The post Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance appeared first on Security Boulevard.
Discover four best practices for payroll compliance and eight key components of payroll compliance.
The post Best Practices for Maintaining Payroll Compliance appeared first on TechRepublic.
Discover four best practices for payroll compliance and eight key components of payroll compliance.
The post Best Practices for Maintaining Payroll Compliance appeared first on TechRepublic.
What Are Non-Human Identities and Secrets Security Management? How does one navigate the intricate web of cybersecurity if non-human identities are participating in networks as much as humans? The proliferation of these machine identities, known as Non-Human Identities (NHIs), has added layers of complexity to cybersecurity management, especially in cloud environments where the stakes are [โฆ]
The post How smart are AI systems in managing cloud compliance appeared first on Entro.
The post How smart are AI systems in managing cloud compliance appeared first on Security Boulevard.
What is ISO 9001? ISO 9001 is recognized globally as the standard for Quality Management Systems (QMS). Its full name is ISO 9001:2015, indicating the most recent revision published in 2015 by the International Organization for Standardization (ISO). This framework is relevant to any organization, regardless of its size, industry, or the products and services [โฆ]
The post ISO 9001: appeared first on Centraleyes.
The post ISO 9001: appeared first on Security Boulevard.
Explore key identity management challenges in pharma and biotech SaaS platforms and learn practical solutions for security, compliance, and scalability.
The post Identity Management Challenges in Pharma & Biotech SaaS Platforms (And How to Solve Them) appeared first on Security Boulevard.
How Can Small Businesses Implement Affordable AI Security? Is AI security a necessity thatโs out of reach for small businesses, or can it fit with budget to protect its digital assets? While we delve into this topic, itโs crucial to understand the significance of AI security and how it can be accessible to organizations of [โฆ]
The post Is advanced AI security affordable for small businesses appeared first on Entro.
The post Is advanced AI security affordable for small businesses appeared first on Security Boulevard.
IBM์ ๊ธฐ์ ๋ฐ ์ ๋ถ๊ฐ ํด๋ผ์ฐ๋ ์ ์ฒด์ ๋ฐ์ดํฐ์ผํฐ ์์น์ ์์กดํ์ง ์๊ณ ๋ ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋ ๋ฐฐํฌ์ ๋ํ ์ด์ ํต์ ๊ถ์ ํ๋ณดํ ์ ์๋๋ก ์ค๊ณ๋ ์ํํธ์จ์ด ์คํ โ์๋ฒ๋ฆฐ ์ฝ์ด(Sovereign Core)โ๋ฅผ ์ถ์ํ๋ค. ์ด๋ฅผ ํตํด CIO๊ฐ ๊ฐํ๋๋ ๊ท์ ์ฌ์ฌ์ ๋์ํ๊ณ ์ปดํ๋ผ์ด์ธ์ค๋ฅผ ์๋ํํ๋ฉฐ, ๋ฐ์ดํฐ์ ์๊ฒฉํ ์์น ์กฐ๊ฑด ์๋์์ ๋ฏผ๊ฐํ AI ์ํฌ๋ก๋๋ฅผ ์ค์ ์ด์ ํ๊ฒฝ์ ๋ฐฐ์นํ ์ ์๋๋ก ์ง์ํ๋ ๊ฒ์ ๋ชฉํ๋ก ํ๊ณ ์๋ค.
์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋๋ ์ผ๋ฐ์ ์ผ๋ก ํด๋ผ์ฐ๋์ ํจ์จ์ฑ์ ํ์ฉํ๋ฉด์๋ ๋ฐ์ดํฐ์ IT ์ด์์ ๋ํ ํต์ ๊ถ์ ์ ์งํ๋ ๋ฐ ์ด์ ์ ๋ง์ถ๋ค. ์ด๋ ๋ฐ์ดํฐ ์์น ๊ท์ ์ ๊ฐ์ ํ์ง ๋ฒ๊ท๋ฅผ ์ค์ํ๋ ๋์์, ๋ฐ์ดํฐ์ ์ด์, ๋ณด์์ ๋ํด ๊ตญ๊ฐ ๋๋ ์กฐ์ง ์ฐจ์์ ์์ ํ ํต์ ๋ฅผ ๋ณด์ฅํ๊ธฐ ์ํด ๋๋ถ๋ถ ํน์ ์ง์ญ์ ๊ตฌ์ถ๋๋ค. ์ด์์ ์ผ๋ก๋ ๊ฒฉ๋ฆฌ๋ ํด๋ผ์ฐ๋ ํ๊ฒฝ์์ ์ด์๋๋ IT ์ธํ๋ผ๋ฅผ ์๋ฏธํ๋ค.
๋ง์ดํฌ๋ก์ํํธ๋ ๊ตฌ๊ธ์ ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋๊ฐ ์ ์ฉ ๋ฐ์ดํฐ์ผํฐ๋ฅผ ๊ธฐ๋ฐ์ผ๋ก ์ค๊ณ๋๋ ๊ฒ๊ณผ ๋ฌ๋ฆฌ, IBM์ ๊ธฐ์ ์ด๋ ์ ๋ถ๊ฐ ๋ฐฐํฌํ๋ ค๋ ๋ชจ๋ ์ํํธ์จ์ด์ ์ ํ๋ฆฌ์ผ์ด์ ์ ์ฃผ๊ถ์ ๊ธฐ๋ณธ์ ์ผ๋ก ํ์ฌํ๊ฒ ๋ค๋ ์ ์ฅ์ด๋ค. IBM์ ์ค๋ 2์ ๊ธฐ์ ํ๋ฆฌ๋ทฐ ๊ณต๊ฐ๊ฐ ์์ ๋ ์๋ฒ๋ฆฐ ์ฝ์ด๋ฅผ ํตํด, ๊ณ ๊ฐ์ด ์์ฒด ํ๋์จ์ด๋ ๋ฌผ๋ก ์ง์ญ ํด๋ผ์ฐ๋ ์ ์ฒด๋ ๋ค๋ฅธ ํด๋ผ์ฐ๋ ํ๊ฒฝ์์๋ ์ํฌ๋ก๋๋ฅผ ์คํํ ์ ์๋ค๊ณ ๋ฐํ๋ค.
ํจ์ฒ๋ผ ๊ทธ๋ฃน(Futurum Group)์ CIO ์ค๋ฌด ์ฑ ์์ ๋์จ ํ์นํด๋ฆฌํ๋ โ์ด๋ ์ ํต์ ์ธ ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋๋ผ๊ธฐ๋ณด๋ค๋, ๊ฐ ์กฐ์ง์ด ์์ฒด์ ์ผ๋ก ํด๋ผ์ฐ๋๋ฅผ ๊ตฌ์ถํ ์ ์๋๋ก ํ๋ ์ํํธ์จ์ด ์คํ์ ๊ฐ๊น๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค. ๊ทธ๋ ์๋ฒ๋ฆฐ ์ฝ์ด๊ฐ ์จํ๋ ๋ฏธ์ค ๋ฐ์ดํฐ์ผํฐ, ์ง์ญ ๋ด์์ ์ง์๋๋ ํด๋ผ์ฐ๋ ์ธํ๋ผ, IT ์๋น์ค ์ ์ฒด๋ฅผ ํตํ ํ๊ฒฝ ๋ฑ ๋ค์ํ ์ด์ ํ๊ฒฝ์์ ํ์ฉ๋ ์ ์๋ค๊ณ ๋ถ์ํ๋ค.
๋ถ์๊ฐ๋ค์ ์ด๋ฌํ ์ ๊ทผ ๋ฐฉ์์ด ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋ ๊ด๋ฆฌ ๋ฐฉ์์ ์ฌ์ ์ํ๊ณ , ๋ฒค๋ ์ข ์์ฑ์ ํผํ๋ ๋ฐ ๋์์ด ๋ ์ ์๋ค๊ณ ์ง๋จํ๋ค.
ํ์นํด๋ฆฌํ๋ ๊ธฐ์กด ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋ ํ๊ฒฝ์์๋ ํด๋ผ์ฐ๋ ์ ์ฒด๊ฐ ์ ๋ฐ์ดํธ๋ ์ ๊ทผ ๊ถํ๊ณผ ๊ฐ์ ํต์ฌ ์ด์ ์์๋ฅผ ๊ณ์ ํต์ ํ๋ ๊ฒฝ์ฐ๊ฐ ๋ง๋ค๊ณ ์ธ๊ธํ๋ค. ์ด๋ก ์ธํด ๊ท์ ๋ฆฌ์คํฌ๊ฐ ์ปค์ง ๋ฟ ์๋๋ผ, ๊ณ ๊ฐ์ด ํน์ ์ ์ฒด์ ์ํคํ ์ฒ์ API, ์ปดํ๋ผ์ด์ธ์ค ๋๊ตฌ์ ์ข ์๋๋ ๊ตฌ์กฐ๊ฐ ํ์ฑ๋ ์ ์๋ค๋ ๊ฒ์ด๋ค.
๋ํ ์ํฌ๋ก๋๋ฅผ ๋ค๋ฅธ ํ๊ฒฝ์ผ๋ก ์ด์ ํ ๊ฒฝ์ฐ, ๊ธฐ์กด ์ ์ฒด์ ์ ์ ๊ด๋ฆฌ ์ฒด๊ณ์ ์ํธํ ํค, ๊ฐ์ฌ ์ถ์ ์ ๋ณด๊ฐ ๋งค๋๋ฝ๊ฒ ์ด์ ๋์ง ์๋ ๋ฌธ์ ๊ฐ ๋ฐ์ํ ์ ์๋ค. ํ์นํด๋ฆฌํ๋ ์ด๋ก ์ธํด CIO๊ฐ ์๋ก์ด ํ๊ฒฝ์์๋ ๊ท์ ์๊ฑด์ ์ถฉ์กฑํ๊ธฐ ์ํด ๊ฑฐ๋ฒ๋์ค ์ฒด๊ณ๋ฅผ ๋ค์ ๊ตฌ์ถํด์ผ ํ๋ ๋ถ๋ด์ ๋ ์๊ฒ ๋๋ค๊ณ ์ง์ ํ๋ค.
๋ฐ๋ฉด IBM์ ์๋ฒ๋ฆฐ ์ฝ์ด๋ ์ํธํ ํค์ ์ ์ ๊ด๋ฆฌ, ์ด์ ๊ถํ์ ๊ฐ ์กฐ์ง์ ๊ดํ ์์ญ ์์ ์ ์งํ ์ ์๋๋ก ํจ์ผ๋ก์จ CIO์๊ฒ ๋ ๋ง์ ํต์ ๊ถ์ ๋ถ์ฌํ ์ ์๋ค. ์ด๋ฐ ๊ตฌ์กฐ๋ก ์ธํด CIO๋ ๊ฑฐ๋ฒ๋์ค ์ฒด๊ณ๋ฅผ ๋ค์ ๊ตฌ์ถํ์ง ์๊ณ ๋ ํด๋ผ์ฐ๋ ์ ์ฒด๋ฅผ ์ ํํ ์ ์๋ค.
ํ์ดํผํ๋ ์ ๋ฆฌ์์น(HyperFRAME Research)์ AI ์คํ ์ด๊ด์ธ ์คํ ํ๋ ์ํฐ๋ ๊ท์ ๊ธฐ๊ด ์ฃผ๋์ ๊ฐ์ฌ๊ฐ ์ ์ ๋ ๋น๋ฒํด์ง๊ณ , ์๊ตฌ ์์ค๋ ๊ฐํ๋๊ณ ์๋ค๊ณ ์ง๋จํ๋ค. ํนํ ์ ๋ฝ์ฐํฉ(EU)์ ๊ท์ ๋น๊ตญ์ ๊ธฐ์ ์ ๊ท์ ์ค์ ์ฝ์๋ง์ผ๋ก๋ ์ถฉ๋ถํ์ง ์๋ค๊ณ ๋ณด๊ณ , ์ค์ ์ค์ ์ฌ๋ถ๋ฅผ ์ ์ฆํ ์ ์๋ ์ฆ๊ฑฐ์ ๊ฐ์ฌ ๊ธฐ๋ก, ์์์ ์ธ ์ปดํ๋ผ์ด์ธ์ค ๋ณด๊ณ ๋ฅผ ์๊ตฌํ๊ณ ์๋ค.
ํ์นํด๋ฆฌํ๋ ์๋ฒ๋ฆฐ ์ฝ์ด๊ฐ ์๋ํ๋ ์ฆ๊ฑฐ ์์ง๊ณผ ์ง์์ ์ธ ๋ชจ๋ํฐ๋ง์ ํตํด ์ด๋ฐ ์๊ตฌ์ ๋์ํ ์ ์๋ค๊ณ ๋ถ์ํ๋ค. ์ด๋ฅผ ํตํด ์ํ๊ณผ ์ ๋ถ ๊ธฐ๊ด, ๋ฐฉ์ ์ฐ์ ๊ณผ ์ฐ๊ด๋ ๋ถ์ผ์์ ๋ฐ์ํ๋ ์ด์ ๋ถ๋ด์ ์ค์ด๋ ๋ฐ๋ ๋์์ด ๋ ์ ์๋ค๊ณ ํ๊ฐํ๋ค.
๋ถ์๊ฐ๋ค์ ์๋ฒ๋ฆฐ ์ฝ์ด๊ฐ ๊ธฐ์ ์ AI ํ์ผ๋ฟ ํ๋ก๊ทธ๋จ์ ์ค์ ์ด์ ํ๊ฒฝ์ ๋ฐฐํฌํ๋ ๋ฐ๋ ํ์ ์ค์ด์ค ์ ์๋ค๊ณ ๋ดค๋ค. ํนํ ์๊ฒฉํ ๋ฐ์ดํฐ ์์น ์กฐ๊ฑด๊ณผ ์ปดํ๋ผ์ด์ธ์ค ํต์ ๊ฐ ์๊ตฌ๋๋ AI ํ๋ก์ ํธ์์ ํจ๊ณผ๊ฐ ํด ๊ฒ์ด๋ผ๋ ๋ถ์์ด๋ค.
HFS ๋ฆฌ์์น(HFS Research)์ CEO ํ ํผ์ํธ๋ ๋๋ถ๋ถ์ ๊ธฐ์ ๊ณผ ์กฐ์ง์ด ์์ฒด ๋ฐ์ดํฐ๋ฅผ ๋ฒ์ฉ AI ๋ชจ๋ธ์ ์ ๋ฌํ๋ ๋ฐ ์ฌ์ ํ ๋ถ๋ด์ ๋๋ผ๊ณ ์๋ค๊ณ ์ง๋จํ๋ฉด์, ๋์์ GPU ๊ธฐ๋ฐ ์ถ๋ก ์ ์์ ํ ์์ฒด ์ฃผ๊ถ ๊ฒฝ๊ณ ์์์๋ง ์คํํ๋ ๊ฒ๋ ํ์ค์ ์ผ๋ก ์ ์ฝ์ด ๋ง์ ์ํฉ์ด๋ผ๊ณ ์ค๋ช ํ๋ค.
์ด์ ๋นํด ์๋ฒ๋ฆฐ ์ฝ์ด์ ๊ธฐ๋ฅ๊ณผ ์ญ๋์ ๊ธฐ์ ๋ฐ ์ ๋ถ ์กฐ์ง์ด ๋ด๋ถ ํ๊ฒฝ์์ AI ์ถ๋ก ์ ์คํํ ์ ์๋๋ก ์ง์ํ๋ค. ์ด๋ฅผ ํตํด ์ฒ๋ฆฌ๋๋ ๋ฐ์ดํฐ๋ฟ ์๋๋ผ AI ๋ชจ๋ธ ์์ฒด๋ ์ฃผ๊ถ ์๊ตฌ์ฌํญ์ ์ถฉ์กฑํ ์ ์์ผ๋ฉฐ, ๊ฒฐ๊ณผ์ ์ผ๋ก CIO๊ฐ ์ฃผ๊ถ์ ํ๋ณดํ๋ฉด์ AI๋ฅผ ํ์ผ๋ฟ ๋จ๊ณ์์ ์ด์ ๋จ๊ณ๋ก ์ฎ๊ธธ ์ ์๋ ๊ธฐ๋ฐ์ ์ ๊ณตํ๋ค๊ณ ํผ์ํธ๋ ์ค๋ช ํ๋ค.
์๋ฒ๋ฆฐ ์ฝ์ด๋ IBM์ด ํฅํ AI ๊ท์ ๊ฐํ ํ๋ฆ์ ์ผ๋์ ๋๊ณ ์๋ฒ๋ฆฐ ํด๋ผ์ฐ๋ ์์ฅ ๊ณต๋ต์ ๋ณธ๊ฒฉํํ๋ ค๋ ์ ๋ต์ผ๋ก ํ์ด๋๋ค. ๋์์ ๋ง์ดํฌ๋ก์ํํธ์ AWS, ๊ตฌ๊ธ ๋ฑ ์ฃผ์ ํด๋ผ์ฐ๋ ์ ์ฒด๋ณด๋ค ํ๋ฐ ์์ ์ฃผ๋๊ถ์ ์ก์ผ๋ ค๋ ์๋๋ ๋ด๊ฒจ ์๋ค.
ํ์นํด๋ฆฌํ๋ โ์ ๋ฝ์ด ๊ท์ ๋ฅผ ๊ฐํํ๊ณ ์์์ํํ์(APAC) ์ง์ญ๋ ์ด๋ฅผ ๋ค๋ฐ๋ฅด๋ ์ํฉ์์, IBM์ ์ฃผ๊ถ ๋ฌธ์ ๊ฐ ๊ธฐ์ ์ AI ๋์ ์ฌ๋ถ๋ฅผ ๊ฐ๋ฅด๋ ํต์ฌ ์์ธ์ด ๋ ๊ฒ์ผ๋ก ๋ณด๊ณ ์๋ค. ์ผ๋ถ ๊ธฐ์ ์์๋ ๋น์ฉ์ด๋ ์ฑ๋ฅ๋ณด๋ค๋ ํจ์ฌ ๋ ์ค์ํ ์์๊ฐ ๋ ์ ์๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
ํนํ EU๋ ์ฃผ์ ํด๋ผ์ฐ๋ ์ ์ฒด ๋๋ถ๋ถ์ด ๋ฏธ๊ตญ์ ๋ณธ์ฌ๋ฅผ ๋๊ณ ์๋ค๋ ์ ์์, ์ธ๊ตญ ๊ธฐ์ ์ด ๋ฐ์ดํฐ์ ์ ๊ทผํ๊ฑฐ๋ ํต์ฌ IT ์์คํ ์ ํต์ ํ๋ ๊ฒ์ ์๊ฒฉํ๊ฒ ๊ท์ ํ๊ณ ์๋ค.
EU ๊ท์ ๋ฅผ ์ถฉ์กฑํ๊ธฐ ์ํด ํด๋ผ์ฐ๋ ์ ์ฒด๋ ๋ณดํต ์ง์ญ ํตํฉ ์ ์ฒด๋ ๊ด๋ฆฌํ ์๋น์ค ์ ์ฒด์ ํ๋ ฅํ๋ค. ๋ค๋ง ํ์นํด๋ฆฌํ์ ๋ฐ๋ฅด๋ฉด, ์ด ๊ฒฝ์ฐ์๋ ๊ธฐ๋ณธ ํ๋ซํผ์ ๋ํ ์ด์ ํต์ ๊ถ์ ํด๋ผ์ฐ๋ ์ ์ฒด๊ฐ ์ ์งํ๊ณ , ํํธ๋๋ ๊ทธ ์์์ ์๋น์ค ๊ตฌ์ถ๊ณผ ์ด์์ ๋งก๋ ๊ฒฝ์ฐ๊ฐ ๋๋ถ๋ถ์ด๋ค.
IBM์ ์๋ฒ๋ฆฐ ์ฝ์ด๋ ํํธ๋๊ฐ ๊ณ ๊ฐ์ ๋์ ํด ์ ์ฒด ํ๊ฒฝ์ ์ง์ ์ด์ํ ์ ์๊ณ , IBM์ ์ด์ ๊ณผ์ ์ ์ ํ ๊ฐ์ ํ์ง ์๋ ๊ตฌ์กฐ๋ค. ํ์นํด๋ฆฌํ๋ ์ด๋ฌํ ์ ๊ทผ์ด ๊ท์ ์ค์ ์ธก๋ฉด์์ ๋ ๋์ ์ ๋ขฐ์ฑ์ ์ ๊ณตํ๋ค๊ณ ๋ถ์ํ๋ค.
์ด์ ๊ด๋ จํด IBM์ ๋
์ผ์ ์ปดํจํ์ผํฐ(Computacenter) ๋ฐ ์ ๋ฝ ์ง์ญ์ ์์์ผ๋ก ์ ์ธ๊ณ IT ์๋น์ค ์
์ฒด์ ํ๋ ฅ์ ํ๋ํ ๊ณํ์ด๋ผ๊ณ ๋ฐํ๋ค. IBM์ ์๋ฒ๋ฆฐ ์ฝ์ด์ ์ถ๊ฐ ๊ธฐ๋ฅ์ ๋ํด 2026๋
์ค๋ฐ ์ ์ ์ถ์ํ ๊ณํ์ด๋ค.
dl-ciokorea@foundryco.com

Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards Non-Human Identities (NHIs) and Secrets Security Management as key components in empowering compliance and enhancing [โฆ]
The post Do AI-driven security systems empower compliance appeared first on Entro.
The post Do AI-driven security systems empower compliance appeared first on Security Boulevard.
A new Harmonic Security report reveals a sharp rise in sensitive data shared with generative AI tools like ChatGPT, increasing the risk of security breaches, compliance violations, and data exposure across global organizations.
The post Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools appeared first on Security Boulevard.
IBM has launched Sovereign Core, a software stack that aims to offer enterprises and governments full operational control over sovereign cloud deployments without relying on hyperscaler-managed regions.
Sovereign deployments, typically, try to combine cloud benefits with strategic autonomy. They are IT infrastructures that have been set up locally, ideally in isolated cloud environments, to ensure complete national or organizational control over data, operations, and security, while ensuring compliance with local laws, such as data residency regulations.
Unlike traditional sovereign clouds from Microsoft or Google that hinge on dedicated data center locations, IBMโs Sovereign Core, expected to be available in tech preview in February, is trying to make sovereignty an inherent property of any software or application that an enterprise or government wants to deploy, enabling customers to run workloads on their own hardware, local providers, or even other clouds.
โItโs less a sovereign cloud and more ofย a software stack to build your own sovereign cloud,โ Dion Hinchcliffe, lead of the CIO practice at the Futurum Group, said, adding that Core can be used across environments, such as on-premises data centers, supported in-region cloud infrastructure, or through IT service providers.
That shift in approach, according to analysts, could redefine how CIOs manage sovereign deployments and help them avoid vendor lock-in.
In traditional sovereign cloud deployments, hyperscalers retain control over critical operations like updates and access, creating regulatory risk and locking customers into provider-specific architectures, APIs, and compliance tools, Hinchcliffe said.
When workloads move, identity management, encryption keys, and audit trails tied to the old provider donโt transfer seamlessly, forcing CIOs to rebuild governance frameworks to meet regulatory requirements in the new environment, Hinchcliffe added.
In contrast, Sovereign Core is trying to offer more control to CIOs by allowing them to keep encryption keys, identity management, and operational authority within their jurisdiction, which should enable them to switch providers without rebuilding governance frameworks, Hinchcliffe pointed out.
Seconding Hinchcliffe, HyperFRAME Researchโs leader of AI stack Stephanie Walter noted that the frequency and stringency of regulator-driven audits were increasing, specifically the EU: Regulators are no longer satisfied with promises of compliance but are seeking more evidence, audit trails, and continuous compliance reporting.
Sovereign Core, according to Hinchcliffe, could also help CIOs tackle these demands with automated evidence collection and continuous monitoring, reducing overhead for banks, government agencies, and defense-adjacent industries.
Analysts say Sovereign Core could help CIOs and their enterprises push their AI pilots into production, especially the ones that require strict data residency and compliance controls.
Most enterprises and organizations are hesitant to send proprietary data to a public AI model, and at the same canโt run GPU-backed inference completely inside their own sovereign boundary, said Phil Fersht, CEO of HFS Research.
Sovereign Coreโs functionalities and capabilities, in contrast, will allow enterprises to run local AI inference inside their own four walls, ensuring the AI model is as โsovereignโ as the data itโs processing, in turn providing CIOs with a credible landing zone to move AI from pilots into production under sovereign conditions, Fersht added.
Sovereign Core could be a strategic move by IBM to double down on the sovereignty market ahead of broader AI regulation and surge ahead of hyperscalers such as Microsoft, AWS, and Google.
โWith Europe tightening controls and APAC following, IBM is betting that sovereignty will be a major gating factor for enterprise AI adoption. For some companies, much more even than cost or performance,โ Hinchcliffe said.
More so in Europe because regulations restrict foreign entities, such as the hyperscalers, which are all headquartered in the US, from having access to data or control over critical IT systems.
To comply with European regulations, hyperscalers typically work with local integrators and managed service providers, but retain operational control of the underlying platform while partners build and manage services on top, Hinchcliffe said.
IBMโs Sovereign Core takes a different approach: partners can operate the entire environment on behalf of the customer, with IBM stepping out of the operational loop altogether, ensuring more compliance with regulations, Hinchcliffe added.
To that extent, IBM said that it is planning to collaborate with IT service providers globally, starting with an initial rollout in Europe with Computacenter in Germany.
IBM plans to make Sovereign Core generally available around the middle of 2026 with additional capabilities, which are likely to be disclosed soon.
