The EU Code of Practice: Practical Governance for the AI-Governed Enterprise

The European Union published a voluntary Code of Practice for general-purpose AI, complementing its upcoming AI Act set to take effect August 2, 2025. Crafted by independent experts and stakeholders, the code emphasizes safety, transparency, security, and copyrighted content use. Signatories—potentially including major LLM providers—will benefit from reduced administrative burdens and clearer legal frameworks. The move signals the EU’s embrace of ‘secure-by-design’ AI while controlling risk, especially relevant for sectors managing sensitive data and vendor-produced AI systems.

Supply Chain Invisibility: The Silent Breach Catalyst

A new LevelBlue report reveals that only 23% of enterprises have high visibility into their software supply chains—even though 40% of CEOs consider it their top security risk . Poor visibility correlates with breaches: 80% of under‑informed organizations suffered incidents in the past year, versus 6% for those with strong visibility. Emerging regulations (EU Cyber Resilience Act, U.S. SBOM mandates) are accelerating action, but risk remains. Firms must embrace software bills of materials and integrate AI‑driven monitoring to reduce third‑party exposure.

Deepfake Governance Attacks: A New Frontier of Trust Exploitation

A man in a suit answering the phone in a boardroom

Deepfake governance attacks are evolving social-engineering weapons. Cloned voices bypass human trust, exploiting familiarity & honor-based workflows. This isn’t just a government threat; CEOs face it too. We need new authentication for communications & decision-making to combat this rising risk. Trust must be earned—every time.

Zero‑Trust for AI-First Workplaces: Lessons from Zscaler

An AI castle with a moat of electricity

Traditional network approaches still rely on IP allowlists, VPN access, and perimeter security to implicitly trust users once inside. With distributed workforces and AI-integrated SaaS platforms, attackers can pivot horizontally once internal. Every user or AI agent becomes a potential threat vector. Removing implicit trust means protecting each identity, session, and API.

How To Minimize the Time to Respond to Cyber Security Threats

Keeping data safe and ensuring network security is safe from threats are on most companies and government entities’ priority lists. Cyber threats and data breaches are becoming more common as cybercriminals find new and unique ways to hack into secure data by invading networks and breaching security vulnerabilities. The best way for companies to protect […]

Impacts of Cyber Security Risks on The Supply Chain

Many of the biggest cybersecurity breaches of the past several years have come via the supply chain. In one of the more notable attacks of 2021, the Irish IT firm Kaseya fell victim to a ransomware virus that infected a small part of their supply chain. According to their CEO, less than one in one […]

Why Cybersecurity Continues to Grow so Rapidly

It seems like every week we hear of another significant cybersecurity breach somewhere in the country. Everyone from corporations to public utilities and even retail banking customers are constantly targeted. Costs of these attacks routinely run into the billions of dollars year after year. As bad as the problem is, it has been getting significantly […]

Cyber Warfare in the Ukraine/Russia War

As one of the bloodiest wars in Europe since Hitler was alive rages across Ukraine, one concern is what types of cyberattacks will be waged by the Russians. While it may seem minor in comparison to the very real bloodshed occurring across Ukraine, cyber warfare can and does have very real life and death consequences, […]

Log4j- What is it and Why is it a Big Topic in Cybersecurity

If you work in cyber security or web development, you have likely heard of the Apache Log4j vulnerability. Many cyber security experts are struggling to fix this vulnerability and malicious attackers can take great advantage of it. Log4j is a piece of software that is leveraged by programmers to help them if they are logging […]

How AI Can Minimize Cybersecurity Risk

In the ever changing world of cybersecurity, staying on top of trends and new technologies is crucial to keep your networks safe and secure. Cyber attacks are happening at an unprecedented pace and cost organizations an enormous amount of money every year. As outlined in the Cost of Data Breach Report for 2021 by IBM, […]