Tag: regulation
-
Continuous Compliance
Organizations manage sensitive data, operate under complex regulations, and face relentless cyber threats. Yet traditional compliance”, point-in-time audits, annual assessments, and static reporting”, is no longer enough. Attackers don’t wait until your next audit, and regulators expect security to be proactive, not reactive. That’s why modern organizations are embracing continuous compliance”, a model that ensures…
-
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
The disruption is the latest to hit a high-profile brand in the United Kingdom, and follows repeated delays in the British government introducing cybersecurity regulations that would require businesses to better protect themselves from attacks. First seen on therecord.media Jump to article: therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government
-
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
Tags: access, advisory, apt, attack, authentication, breach, china, cisa, cisco, cloud, compliance, computer, computing, control, credentials, cryptography, cve, cyber, cybersecurity, data, defense, detection, espionage, exploit, firmware, framework, google, government, guide, hacker, Hardware, incident response, infrastructure, international, Internet, iot, login, mfa, military, mitigation, monitoring, network, nist, organized, password, phishing, ransomware, regulation, risk, russia, sans, service, software, technology, theft, threat, tool, update, vulnerability, zero-trustDestructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the spotlight, we’re rounding up recent cyber advice for securing critical infrastructure. In case you missed it, here…
-
HHS Says It’s ‘Cracking Down’ on Health Information Blocking
Feds Ramp Up Enforcement of 21st Cures Act Regs Including Fines up to $1 Million. The Department of Health and Human Services says it’s cracking down on healthcare providers, health IT developers and health information networks that block the exchange, access and use of patients’ electronic health data. Info blocking regulations have been on the…
-
France slaps Google with Euro325M fine for violating cookie regulations
The French data protection authority has fined Google Euro325 million ($378 million) for violating cookie regulations and displaying ads between Gmail users’ emails without their consent. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/france-slaps-google-with-325m-fine-for-violating-cookie-regulations/
-
Quantum Is Closer Than You Think”, So Why Are You Still Encrypting Like It’s 2015?
Tags: access, ai, business, cloud, communications, compliance, computer, computing, container, crypto, cryptography, data, defense, encryption, endpoint, exploit, government, guide, Hardware, infrastructure, network, nist, privacy, regulation, resilience, risk, risk-assessment, service, software, strategy, technology, threat, tool, update, vulnerabilityQuantum Is Closer Than You Think”, So Why Are You Still Encrypting Like It’s 2015? madhav Tue, 09/02/2025 – 05:43 Not long ago, the idea that quantum computers could one day break today’s strongest encryption felt like science fiction. Today, it’s no longer about if”, but when. While real-world demonstrations of quantum algorithms like Shor’s…
-
Apple Contends UK’s ‘EU-Style’ Antitrust Regulations Harm Users and Developers
In a statement to TechRepublic, Apple also says the UK regulations threaten the security of its products. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-warns-uk-regulation/
-
How compliance teams can turn AI risk into opportunity
AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/27/matt-hillary-drata-ai-regulatory-compliance/
-
Beyond GDPR security training: Turning regulation into opportunity
Discover how GDPR compliance can spark real growth and give you a competitive advantage with practical strategies and a strong security culture. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/beyond-gdpr-security-training-turning-regulation-into-opportunity/
-
CIISec: Most Security Professionals Want Stricter Regulations
A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ciisec-security-professionals/
-
U.S. could feel effects of EU AI Act as companies comply
The U.S. may be making a deregulatory push on AI, but the EU AI Act means large U.S. AI developers must comply with AI regulations that will affect their models regardless. First seen on techtarget.com Jump to article: www.techtarget.com/searchcio/news/366629882/US-could-feel-effects-of-EU-AI-Act-as-companies-comply
-
How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In the second of a two-part blog series, Tenable CSO Robert Huber shares how exposure management has helped him reduce risk and better align with the business. You can read the entire Exposure…
-
How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In the second of a two-part blog series, Tenable CSO Robert Huber shares how exposure management has helped him reduce risk and better align with the business. You can read the entire Exposure…
-
Meet the unsung silent hero of cyber resilience you’ve been ignoring
Tags: ai, blockchain, compliance, computing, cyber, cybersecurity, defense, detection, dora, framework, GDPR, governance, infrastructure, iot, monitoring, network, PCI, regulation, resilience, technology, toolFixing this isn’t complicated. It just needs your focused attention: First, secure your sources. Forget public NTP servers from dubious origins. Instead, choose authenticated and secure protocols, such as NTP or Network Time Security (NTS). These protocols offer encrypted and tamper-resistant synchronization, ensuring that your clocks can’t be easily spoofed.Next, redundancy matters. Don’t rely on…
-
How AI is reshaping cybersecurity operations
Tags: access, ai, attack, business, ciso, cloud, control, cyber, cybersecurity, data, defense, detection, encryption, finance, gartner, governance, guide, hacker, infrastructure, intelligence, jobs, malware, microsoft, monitoring, phishing, regulation, resilience, risk, sans, service, skills, soc, strategy, supply-chain, technology, threat, tool, training, updateBecause AI can perform tasks at speeds that supersede human capacity, it exponentially scales the amount of work that a cybersecurity function can do, says Rob T. Lee, chief of research for AI and emerging threats and head of faculty at SANS Institute.Moreover, AI excels at doing repetitive tasks near perfectly every time, so it…
-
US warns tech companies against complying with European and British ‘censorship’ laws
U.S. tech companies were warned they could face action from the Federal Trade Commission (FTC) for complying with the European Union and United Kingdom’s regulations about the content shared on their platforms. First seen on therecord.media Jump to article: therecord.media/tech-companies-ftc-censorship-laws
-
Ensuring security in a borderless world: The 30th anniversary of Schengen system
Tags: access, ai, cloud, compliance, computing, control, country, cyber, cybersecurity, data, dora, encryption, framework, GDPR, infrastructure, mfa, network, nis-2, office, privacy, regulation, resilience, technology, tool, update -
What is the cost of a data breach?
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, detection, finance, fraud, healthcare, ibm, identity, incident response, india, infrastructure, insurance, intelligence, jobs, law, metric, privacy, programming, ransom, ransomware, regulation, risk, security-incident, service, skills, software, supply-chain, technology, theft, threat, tool, vulnerabilityCanada ($4.84 million) and the UK ($4.14million) remain in the top 10 hardest hit, with ASEAN or Association of Southeast Asian Nations ($3.67 million), Australia ($2.55 million), and India ($2.51 million) among the top 15. Breaches by industry: Healthcare remains the industry hit with the highest costs per breach by far, at $7.42 million despite…
-
Cryptoagility: the strategic pillar for digital resilience
Tags: compliance, crypto, cryptography, dora, finance, framework, google, infrastructure, PCI, regulation, resilience, risk, strategy, update, vulnerabilityA real case: the Chromecast incident: A real example I personally experienced made me appreciate this approach even more: on 9 March 2025, my second-generation Chromecast stopped working. It displayed the message “Untrusted device” when trying to cast, with no possibility of a solution. This problem was global, affecting users in several countries, and was…
-
Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java
Many global regulations and legislations have strict requirements around Java application security, incident reporting, and more. Azul has an unmatched set of solutions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/three-ways-to-ensure-regulatory-and-legislative-compliance-with-non-oracle-java/
-
Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
Tags: regulationBut it can contest if it lands up in ‘Category 1,’ and the move hurts operations, says judge First seen on theregister.com Jump to article: www.theregister.com/2025/08/11/wikimedia_foundation_loses_online_safety/
-
CSO hiring on the rise: How to land a top security exec role
Tags: access, ai, attack, breach, business, cio, ciso, cloud, compliance, cyber, cybersecurity, data, defense, finance, governance, government, healthcare, identity, incident, incident response, infrastructure, insurance, jobs, military, network, regulation, resilience, risk, saas, service, skills, software, strategy, technology, threat, trainingWide-scale AI adoption shaking up skills sought: In terms of the skills wanted of today’s CSO, Fuller agrees that AI is the game-changer.”Organizations are seeking cybersecurity leaders who combine technical depth, AI fluency, and strong interpersonal skills,” Fuller says. “AI literacy is now a baseline expectation, as CISOs must understand how to defend against AI-driven…

