Tag: regulation
-
New COPPA Rules to Take Effect Over Child Data Privacy Concerns
New regulations and compliance standards for the Children’s Online Privacy Protection Act reflect how much technology has grown since the Federal Trade Commission last updated it in 2013. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/new-coppa-rules-children-data-privacy-concerns
-
Europe Is Elevating Cyber Resilience in Critical Infrastructure
Forrester’s McKay and van der Hout on How Regulations Are Driving Cyber Resilience. Security leaders worldwide are elevating resilience in cyber strategies, where Europe emerges as a frontrunner globally in protecting critical infrastructure. Driven by regulation such as NIS2 and DORA, its cybersecurity posture reflects strong resilience planning amid increasing disruptions. First seen on govinfosecurity.com…
-
India’s Security Leaders Struggle to Keep Up With Threats
Business and security executives in the South Asian nation worry over AI, cybersecurity, new digital privacy regulations, and a talent gap that hobbles innovation. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/india-security-leaders-struggle-threats
-
Trump executive order alters Biden-era cybersecurity regulations
First seen on scworld.com Jump to article: www.scworld.com/news/trump-executive-order-alters-biden-era-cybersecurity-regulations
-
UK cyber agency pushes for ‘strategic policy agenda’ as government efforts stall
Leaders at the U.K.’s National Cyber Security Centre are calling for more political attention on cybersecurity, arguing that regulation and legislation aren’t keeping up with technology. First seen on therecord.media Jump to article: therecord.media/ncsc-pushes-uk-government-create-strategic-cyber-policy-agenda
-
Boards Leave CISOs Exposed to Legal Risks
Attorney Jonathan Armstrong Says Board Diversity Must Include Cybersecurity Skills. Many boards lack cybersecurity expertise, leaving CISOs exposed to legal risks. New fraud laws and AI regulations compound the challenge as security leaders struggle for boardroom support, said Jonathan Armstrong, partner at Punter Southall Law. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/boards-leave-cisos-exposed-to-legal-risks-a-28621
-
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625476/UK-ICO-publishes-AI-and-biometrics-strategy
-
CIAM Across Industries: A Journey Through Digital Identity Neighborhoods
The rapid pace of technological change, evolving regulations, and shifting customer expectations require CIAM systems that can adapt and evolve over time. The organizations that build sustainable competitive advantages through CIAM are those that invest in flexible, extensible architectures that can accommodate future requirements without requiring complete system replacements. First seen on securityboulevard.com Jump to…
-
Finding Balance in US AI Regulation
The US can’t afford to wait for political consensus to catch up to technological change. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/finding-balance-us-ai-regulation
-
Satisfying Compliance Demands with Enhanced Cloud Security
Are You Navigating the Compliance Landscape Successfully? Compliance challenges where stringent data protection regulations reign supreme can indeed be daunting. Are companies adequately prepared to satisfy these demands? The potent mix of Non-Human Identities (NHIs) and Secrets Security Management might just be the key to unshackling organizations from these daunting conundrums. Demystifying Non-Human Identities (NHIs)……
-
#Infosec2025: Demand More of Your Vendors to Ease Quantum Transition, Say Experts
CISOs should demand more of their vendors and use regulation as an ally to persuade board members to accelerate the transition to post-quantum safety First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/infosec2025-vendors-quantum/
-
Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs
Edge computing and stricter regulations may usher in a new era of AI privacy. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/open-weight-chinese-ai-models-drive-privacy-innovation-llm
-
48% of security pros are falling behind compliance requirements
32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/02/software-compliance-regulations-requirements/
-
Code security in the AI era: Balancing speed and safety under new EU regulations
Tags: ai, compliance, cyber, finance, government, open-source, programming, regulation, resilience, risk, software, technology, tool, update, vulnerability, windowsThe regulatory response: EU Cyber Resilience Act European regulators have taken notice of these emerging risks. The EU Cyber Resilience Act is set to take full effect in December 2027, and it imposes comprehensive security requirements on manufacturers of any product that contains digital elements.Specifically, the act mandates security considerations at every stage of the…
-
AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report
Tags: ai, api, attack, authentication, awareness, breach, cloud, compliance, computing, control, crypto, cryptography, data, encryption, guide, malicious, malware, mfa, nist, passkey, phishing, privacy, programming, ransomware, regulation, risk, software, strategy, threat, tool, vulnerabilityAI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report madhav Tue, 05/27/2025 – 04:40 The Thales 2025 Data Threat Report reveals a critical inflection point in global cybersecurity. As the threat landscape grows more complex and hostile, the rapid adoption of generative AI is amplifying both opportunity and…
-
Decoding EASA Regulation Part-IS: A Comprehensive Guide to Strengthening Aviation Cybersecurity
What is EASA? EASA has long been synonymous with excellence in aviation safety. As the regulatory authority for the European Union, EASA sets the standards that govern everything from aircraft design to operational protocols. Its mission is clear: to ensure that every aspect of aviation is as safe and reliable as possible. Cybersecurity has emerged……
-
Bipartisan bill simplifying federal cyber regulations reintroduced
First seen on scworld.com Jump to article: www.scworld.com/brief/bipartisan-bill-simplifying-federal-cyber-regulations-reintroduced
-
Senators revive bill to harmonize conflicting cybersecurity regulations
The legislation Sens. Gary Peters and James Lankford would create an executive branch panel to align federal cyber rules. First seen on cyberscoop.com Jump to article: cyberscoop.com/senators-revive-bill-to-harmonize-conflicting-cybersecurity-regulations/
-
Regeneron Pledges Privacy Protection in $256M Bid for 23andMe
Regeneron’s acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/regeneron-pledge-privacy-23andme-acquisition
-
Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud
Tags: access, ai, application-security, attack, best-practice, breach, business, cloud, compliance, control, cyberattack, data, data-breach, dora, encryption, finance, framework, gartner, GDPR, google, ibm, infrastructure, international, mfa, network, PCI, phishing, privacy, regulation, risk, saas, service, strategy, threatYour Data, Your Responsibility: Securing Your Organization’s Future in the Cloud madhav Tue, 05/20/2025 – 04:37 Cloud adoption has fundamentally changed the way businesses operate, offering scalability, agility, and cost efficiencies that were unimaginable just a decade ago. But with this shift comes a necessary conversation: the cloud can also introduce complex security risks without…
-
4 ways to safeguard CISO communications from legal liabilities
Tags: ciso, communications, corporate, cyber, data, defense, governance, government, incident, jobs, law, privacy, regulation, risk, vulnerabilityPay attention to the medium: CISOs also need to pay attention to what they say based on the medium in which they are communicating. Pay attention to “how we communicate, who we’re communicating with, what platforms we’re communicating on, and whether it’s oral or written,” Angela Mauceri, corporate director and assistant general counsel for cyber…
-
Relaxing the Burden of Compliance with Automation
Does your Organization Struggle with Compliance? If so, you’re not alone. Compliance with cybersecurity regulations often involves navigating a complex web of rules, many of which are constantly changing. This can be a burdensome task for any organization, particularly those operating. But what if there was a way to alleviate this burden? Enter the field……
-
Brussels Court Slams Tracking-Based Ads, Upholds GDPR Privacy Standards
The Brussels Court of Appeal ruled on May 14, 2025, that the consent model used in tracking-based advertising by major tech companies such as Google, Microsoft, Amazon, and X (formerly Twitter) does not comply with EU privacy laws, including the General Data Protection Regulation (GDPR). First seen on thecyberexpress.com Jump to article: thecyberexpress.com/brussels-court-tracking-ads-gdpr/
-
AI regulation to commence once issues arise, says FTC chair
First seen on scworld.com Jump to article: www.scworld.com/brief/ai-regulation-to-commence-once-issues-arise-says-ftc-chair
-
Top 10 Best Practices for Effective Data Protection
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework?In this article, we’ll explore data protection best practices…
-
Data on sale: Trump administration withdraws data broker oversight proposal
Tags: breach, compliance, data, data-breach, exploit, finance, framework, group, identity, infrastructure, law, military, privacy, regulation, theft, vulnerabilityPrivacy concerns escalate : Without these protections, data brokers can continue collecting and selling Americans’ sensitive personal information with minimal oversight. This data often includes Social Security numbers, financial records, location histories, and purchase patterns, leaving consumers vulnerable to identity theft and fraud. “Demographic groups already underserved by mainstream financial services”, low-income earners, elderly individuals, and racial…

