Tag: regulation
-
NDSS 2025 THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
Tags: ai, backdoor, business, conference, Internet, malicious, network, regulation, technology, threat, trainingSESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore), Florian Kerschbaum (University of Waterloo), Tianwei Zhang (Nanyang Technological University) ———– PAPER THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Personalization has become a…
-
NDSS 2025 THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
Tags: ai, backdoor, business, conference, Internet, malicious, network, regulation, technology, threat, trainingSESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore), Florian Kerschbaum (University of Waterloo), Tianwei Zhang (Nanyang Technological University) ———– PAPER THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Personalization has become a…
-
From code to boardroom: A GenAI GRC approach to supply chain risk
Tags: ai, blockchain, business, ciso, compliance, dark-web, data, defense, finance, framework, gartner, grc, intelligence, LLM, metric, open-source, regulation, resilience, risk, strategy, supply-chain, threat, vulnerabilityThe GenAI GRC mandate: From reporting to prediction: To counter a threat that moves at the speed of computation, our GRC must also become generative and predictive. The GenAI GRC mandate is to shift the focus from documenting compliance to predicting systemic failure.Current GRC methods are designed for documentation. They verify that a policy exists.…
-
From code to boardroom: A GenAI GRC approach to supply chain risk
Tags: ai, blockchain, business, ciso, compliance, dark-web, data, defense, finance, framework, gartner, grc, intelligence, LLM, metric, open-source, regulation, resilience, risk, strategy, supply-chain, threat, vulnerabilityThe GenAI GRC mandate: From reporting to prediction: To counter a threat that moves at the speed of computation, our GRC must also become generative and predictive. The GenAI GRC mandate is to shift the focus from documenting compliance to predicting systemic failure.Current GRC methods are designed for documentation. They verify that a policy exists.…
-
Unified Compliance with AI: Optimizing Regulatory Demands with Internal Tools
Key Takeaways What is Unified AI Oversight? In today’s AI landscape, organizations face overlapping regulations, ethical expectations, and AI operational risks. Unified AI oversight is a single lens to manage AI systems while staying aligned with global rules, reducing blind spots and duplication. It ensures AI systems are not only compliant but also ethical, secure,……
-
FCC spikes Biden-era cyber regulations prompted by Salt Typhoon telecom breaches
The Republican-led FCC voted to remove cybersecurity rules for telecom companies that were put in place before Donald Trump’s inauguration as a response to 2024 breaches attributed to state-backed Chinese hackers. First seen on therecord.media Jump to article: therecord.media/fcc-removes-biden-era-cybersecurity-rules-telecoms-salt-typhoon
-
3 ways CISOs can win over their boards this budget season
Tip 2: Go beyond compliance standards: It’s no secret that compliance and regulations drive nearly 80% of CISOs’ budget justifications. Industry standards like HIPAA and SOC2 can offer a guiding framework for a program, but with evolving threats from AI, the rise of quantum computing and increasingly complex third-party risk, CISOs need to think of…
-
European Commission ‘simplification’ proposal would weaken GDPR, AI regulations
Under the proposal, the EU would weaken data protection rules by delaying when regulations governing high-risk AI systems take effect and allowing companies to use personal data for AI training without prior consent from users in most circumstances. First seen on therecord.media Jump to article: therecord.media/european-commission-proposal-gdpr-ai-simplification
-
ISMG Fraud Prevention, Financial Cyber Summits: The AI Bet
Tags: ai, ciso, compliance, cyber, cybersecurity, defense, finance, fraud, identity, regulation, resilience, risk, strategy, threatCyber Leaders Address AI Threats, Compliance Resilience, Zero Trust. From AI”‘driven fraud schemes to tightening regulations and identity threats, ISMG’s New York Fraud Prevention and Financial Cybersecurity Summits brought together CISOs, investigators and risk leaders to share practical strategies for strengthening defenses and building true resilience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-fraud-prevention-financial-cyber-summits-ai-bet-a-30055
-
ISMG Fraud Prevention, Financial Cyber Summits: The AI Bet
Tags: ai, ciso, compliance, cyber, cybersecurity, defense, finance, fraud, identity, regulation, resilience, risk, strategy, threatCyber Leaders Address AI Threats, Compliance Resilience, Zero Trust. From AI”‘driven fraud schemes to tightening regulations and identity threats, ISMG’s New York Fraud Prevention and Financial Cybersecurity Summits brought together CISOs, investigators and risk leaders to share practical strategies for strengthening defenses and building true resilience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-fraud-prevention-financial-cyber-summits-ai-bet-a-30055
-
Why We Can’t Expect Meta to Stop Online Scams on Its Own
Only Regulations Can Convince Meta to Cut Its Revenue Stream From Fraud Victims How motivated would you be to stop a source of revenue if you discovered that some of your advertisers are scamming your customers? Most businesses would want to protect their customers. In the strange universe of social media giant Meta, incentives for…
-
TDL 009 – Inside DNS Threat Intelligence: Privacy, Security Innovation
Tags: access, apple, attack, automation, backup, best-practice, business, ceo, cisco, ciso, cloud, computer, control, corporate, country, crime, cybersecurity, data, dns, encryption, finance, firewall, government, infrastructure, intelligence, Internet, jobs, law, linkedin, malicious, marketplace, middle-east, monitoring, msp, network, office, privacy, regulation, risk, service, software, strategy, threat, tool, windows, zero-trustSummary Inside DNS Threat Intelligence: Privacy, Security & Innovation In this episode of the Defenders Log, host David Redekop speaks with Tim Adams, the founder of the protective DNS resolver Scout DNS. Tim shares his origin story, explaining how he transitioned from a wireless network integrator to building his own DNS solution. He saw a…
-
UK Unveils Cyber Security and Resilience Bill
Legislation Proposes More Regulations for Greater Swath of the UK Economy. The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue. First seen on govinfosecurity.com Jump to article:…
-
EU’s reforms of GDPR, AI slated by privacy activists for ‘playing into Big Tech’s hands’
Lobbying efforts gain ground as proposals carve myriad holes into regulations First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/eu_leaked_gdpr_ai_reforms/
-
EU’s reforms of GDPR, AI slated by privacy activists for ‘playing into Big Tech’s hands’
Lobbying efforts gain ground as proposals carve myriad holes into regulations First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/eu_leaked_gdpr_ai_reforms/
-
The quiet revolution: How regulation is forcing cybersecurity accountability
The most important story in cybersecurity today is not about the next breach, but how organizations respond and evolve in light of accountability. First seen on cyberscoop.com Jump to article: cyberscoop.com/how-cybersecurity-regulation-is-driving-accountability/
-
The quiet revolution: How regulation is forcing cybersecurity accountability
The most important story in cybersecurity today is not about the next breach, but how organizations respond and evolve in light of accountability. First seen on cyberscoop.com Jump to article: cyberscoop.com/how-cybersecurity-regulation-is-driving-accountability/
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
IntroductionFinancial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement.Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in…
-
AI and the Changing Nature of Work
AI’s Impact on Productivity and Employment Demands Proactive Policy Action The future of work is no longer speculative, it is already being coded. From automated writing assistants to robotic warehouse employees, artificial intelligence is entering every part of the modern workforce faster than regulations or social frameworks can adapt. First seen on govinfosecurity.com Jump to…

