Tag: law
-
Ring to partner with Flock, giving law enforcement easier access to home security camera footage
Under the new partnership, law enforcement agencies which use Flock Safety products can ask Ring owners to provide images for “evidence collection and investigative work,” according to a blog post on the Ring website. First seen on therecord.media Jump to article: therecord.media/ring-partner-flock-law-enforcement-video
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
13 cybersecurity myths organizations need to stop believing
Tags: access, ai, attack, authentication, backup, banking, breach, business, ceo, compliance, computer, computing, corporate, credentials, cyber, cybersecurity, data, data-breach, deep-fake, defense, encryption, finance, government, group, identity, incident response, infrastructure, jobs, law, malicious, mfa, monitoring, network, nist, openai, passkey, password, phishing, privacy, regulation, risk, service, skills, strategy, technology, theft, threat, tool, vulnerabilityBig tech platforms have strong verification that prevents impersonation: Some of the largest tech platforms like to talk about their strong identity checks as a way to stop impersonation. But looking good on paper is one thing, and holding up to the promise in the real world is another.”The truth is that even advanced verification…
-
Privacy Leaders Now Bridge AI, Data and Business Goals
Jumio’s Joe Kaufmann on How CPOs Drive Value by Aligning Privacy With Business. Privacy leaders are taking on strategic roles as artificial intelligence and data protection laws evolve. Jumio’s Global Privacy Head Joe Kaufmann said chief privacy officers now help build data trust, manage compliance and enable business growth through responsible data use. First seen…
-
California enacts age verification, chatbot laws
Tags: lawCalifornia’s governor signed a bill that requires chatbot operators to set up a system to prevent suicidal ideation, an issue that several federal lawmakers have also focused on in recent months. First seen on therecord.media Jump to article: therecord.media/california-enacts-age-verification-chatbot-laws
-
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE andrew.gertz@t“¦ Mon, 10/13/2025 – 14:53 Discover how Thales empowers enterprises with sovereign access through FIDO authentication in SAS PCE”, ensuring secure, phishing-resistant identity control for hybrid environments. Identity & Access Management Access Control Guido Gerrits – Field Channel Director, EMEA More About This Author…
-
Chinese Owners Locked Out of Dutch Chip Maker Nexperia
Dutch Ministry Invokes National Security Law to Impose Domestic Control. The Dutch government said it is severing semiconductor chipmaker Nexperia from control by its Chinese parent after invoking a national security law allowing it to impose domestic control. Partially Chinese state-controlled Wingtech Technologies acquired a three quarters stake in Nexperia in 2018. First seen on…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Microsoft violated EU law in handling of kids’ data, Austrian privacy regulator finds
Austria’s data protection authority ruled that Microsoft illegally tracked students using its education software by failing to give them access to their data and using cookies without consent. First seen on therecord.media Jump to article: therecord.media/microsoft-violated-eu-law-austria
-
Feds Shutter ShinyHunters Salesforce Extortion Site
The group warned that law-enforcement crackdowns are imminent in the wake of the takedown, but its extortion threats against Salesforce victims remain active. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/shinyhunters-feds-shutter-salesforce-extortion-site
-
Red Pilling of Politics Court Strikes Down California Law on Political Deepfakes
California’s AB 2655 aimed to fight AI-generated political deepfakes, but a federal court struck it down under Section 230, highlighting the clash between free speech and AI regulation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/red-pilling-of-politics-court-strikes-down-california-law-on-political-deepfakes/
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Chinese-Linked Hackers Breach Top Political US Law Firm
Williams & Connolly Hit in Zero-Day Campaign Impacting Client Emails. A zero-day vulnerability was used to breach email accounts at the elite D.C. law firm Williams & Connolly, with officials reportedly suspecting the hack is part of a China-linked campaign targeting the U.S. legal sector to support espionage, steal intelligence and establish long-term access routes.…
-
Renewal of cyber information-sharing law must mind the gap, senator says
Companies that are still sharing threat information with the government despite the lapse of the law known as CISA 2015 should be protected retroactively when Congress revives that authority, Sen. Gary Peters says. First seen on therecord.media Jump to article: therecord.media/cisa-2015-renewal-peters-bill-gap-in-liability-protections
-
Renewal of cyber information-sharing law must mind the gap, senator says
Companies that are still sharing threat information with the government despite the lapse of the law known as CISA 2015 should be protected retroactively when Congress revives that authority, Sen. Gary Peters says. First seen on therecord.media Jump to article: therecord.media/cisa-2015-renewal-peters-bill-gap-in-liability-protections
-
Sen. Peters tries another approach to extend expired cyber threat information-sharing law
A new bill renames the Cybersecurity Information Sharing Act of 2015 and would make its legal protections retroactive after its lapse. First seen on cyberscoop.com Jump to article: cyberscoop.com/gary-peters-cyber-threat-information-sharing-law-rand-paul/
-
Sen. Peters tries another approach to extend expired cyber threat information-sharing law
A new bill renames the Cybersecurity Information Sharing Act of 2015 and would make its legal protections retroactive after its lapse. First seen on cyberscoop.com Jump to article: cyberscoop.com/gary-peters-cyber-threat-information-sharing-law-rand-paul/
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
California enacts law giving consumers ability to universally opt out of data sharing
The California Consumer Privacy Act, signed in 2018, gave Californians the right to send opt-out signals, but major browsers have not had to make opt-outs simple to use. First seen on therecord.media Jump to article: therecord.media/california-signs-law-opt-out-browsers
-
California enacts law giving consumers ability to universally opt out of data sharing
The California Consumer Privacy Act, signed in 2018, gave Californians the right to send opt-out signals, but major browsers have not had to make opt-outs simple to use. First seen on therecord.media Jump to article: therecord.media/california-signs-law-opt-out-browsers
-
Major US law firm says hackers broke into attorneys’ emails accounts
While the firm did not specify which nation-state it believes the hacker is affiliated with, The New York Times reported that sources have said it is China. First seen on therecord.media Jump to article: therecord.media/us-law-firm-hackers-breached-email

