Tag: regulation
-
Security chiefs whose companies operate in the EU should be exploring DORA now
Tags: attack, business, ciso, compliance, conference, corporate, cyber, cybersecurity, data, detection, dora, finance, framework, GDPR, incident, network, regulation, resilience, risk, service, technology, threat, vulnerabilityIf your enterprise operates in Europe, you should care about the Digital Operational Resilience Act (DORA), which took effect on January 17. DORA, also known as Directive (EU) 2022/2555 of the European Parliament, aims to enhance and build the EU’s cybersecurity capabilities and it has been hanging like the Sword of Damocles over the heads…
-
Three Keys to Modernizing Data Security: DSPM, AI, and Encryption
Tags: access, ai, automation, best-practice, business, cloud, compliance, container, control, cyber, cybercrime, data, data-breach, detection, encryption, GDPR, incident response, infrastructure, privacy, regulation, risk, saas, security-incident, skills, software, strategy, threat, tool, vulnerabilityThree Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t“¦ Tue, 01/21/2025 – 14:56 Organizations worldwide face a “perfect storm” of increasing and ever-evolving cyber threats. Internal and external factors are at play, elevating cyber risks and their consequences and mandating new approaches to safeguard data. A recent study based on responses from over…
-
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
noyb files complaints against TikTok, AliExpress, and other Chinese companies for illegal EU user data transfers to China, violating data protection laws. Austrian privacy non-profit group None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully…
-
DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
The EU’s DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/dora-financial-firms-compliance/
-
Large Language Models and Regulations: Navigating the Ethical and Legal Landscape
Leverage the full potential of Large Language Models (LLMs) for your business while staying compliant. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/large-language-models-and-regulations-navigating-the-ethical-and-legal-landscape/
-
Biden Issues Final Maritime Cybersecurity Rules
White House Mandates Cyber Incident Response Plans Amid Growing Chinese Threat. Federal regulations unveiled Tuesday require the U.S. maritime industry to implement baseline cybersecurity measures amid concerns over exposure to attacks from adversaries such as China. The rules mandate cybersecurity plans and clearly-defined cyber positions in ports and maritime facilities. First seen on govinfosecurity.com Jump…
-
CISOs embrace rise in prominence, with broader business authority
Tags: ai, attack, business, ceo, cio, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, data, governance, healthcare, infrastructure, intelligence, network, privacy, regulation, risk, risk-management, security-incident, strategy, technology, threat, updateIt’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within the organization.According to CSO’s 2024 Security Priorities Study, 72% of security decision-makers say their role has grown to include additional responsibilities over the past…
-
SEC rule confusion continues to put CISOs in a bind a year after a major revision
Tags: attack, breach, business, ciso, citrix, compliance, control, cyber, cyberattack, cybersecurity, data, government, incident, incident response, law, network, privacy, regulation, risk, security-incident, software, strategy, supply-chainConfusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came into effect, experts say.As the agency that regulates and enforces federal US securities laws continues to flex its enforcement muscles against organizations that violate the strict rules,…
-
European Court Fines European Commission for Privacy Breach
Transfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
European Court Fines European Commission for Privacy Violation
Transfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
European Court Fines European Commission for GDPR Violation
Transfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
Court orders European Commission to pay its first-ever GDPR fine
A German citizen will receive Euro400 from the European Commission for a violation of the General Data Privacy Regulation (GDPR), the first time the EU’s executive arm will pay such a fine.]]> First seen on therecord.media Jump to article: therecord.media/european-commission-pays-gdpr-fine-german-citizen
-
The biggest data breach fines, penalties, and settlements so far
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
IoT’s Regulatory Reckoning Is Overdue
New security regulations are more than compliance hurdles, they’re opportunities to build better products, restore trust, and lead the next chapter of innovation. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/iot-regulatory-reckoning-overdue
-
More telecom firms were breached by Chinese hackers than previously reported
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
More stringent drone regulations proposed
Tags: regulationFirst seen on scworld.com Jump to article: www.scworld.com/brief/more-stringent-drone-regulations-proposed
-
Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation
The outgoing chair weighs in on how the FCC has addressed newer technologies, efforts to respond to Chinese intrusions into U.S. telecom networks, and regulating AI in political ads. First seen on cyberscoop.com Jump to article: cyberscoop.com/fcc-jessica-rosenworcel-exit-interview-legacy-cybersecurity-ai/
-
Proposed HIPAA Amendments Will Close Healthcare Security Gaps
Tags: authentication, control, cybersecurity, healthcare, HIPAA, mfa, network, privacy, regulation, threatThe changes to the healthcare privacy regulation with technical controls such as network segmentation, multi-factor authentication, and encryption. The changes would strengthen cybersecurity protections for electronic health information and address evolving threats against healthcare entities. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/proposed-hipaa-amendments-close-healthcare-security-gaps
-
DORA Regulation (Digital Operational Resilience Act): A Threat Intelligence Perspective
The Digital Operational Resilience Act (DORA) is coming in 2025. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/dora-regulation-digital-operational-resilience-act-a-threat-intelligence-perspective/
-
Cybersecurity regulations in 2025: Key insights from top industry experts
First seen on scworld.com Jump to article: www.scworld.com/feature/how-will-rules-and-regulations-affect-cybersecurity-and-ai-in-2025
-
Tighter regulations proposed for foreign IT in drones used in US
The Bureau of Industry and Security wants public feedback on how information technology in drones could pose a national security risk, particularly from adversaries such as China and Russia.]]> First seen on therecord.media Jump to article: therecord.media/proposed-drone-supply-chain-regulation-commerce-department
-
Why ISMS Policies Are Crucial for Compliance in Cybersecurity?
In 2025, the cybersecurity landscape will continue to evolve rapidly, driven by increasing cyber threats and technological advancements. As governments and regulatory bodies implement stricter cybersecurity regulations, businesses will face pressure to ensure compliance. Failing to meet these standards could result in severe penalties, financial losses, and reputational damage. This blog will explore the key……
-
Regulations, security, and remote work: Why network outsourcing is booming
A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies across increasingly complex networks, according to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/31/enterprise-networking-risks/

