Tag: regulation
-
UK Passes Data Use and Access Regulation Bill
Government Says Bill Will ‘Pump 10 Billion Pounds’ Into Economy. The U.K. government passed the Data Use and Access Bill that will introduce a host of privacy changes intended at making data processing more lenient with a motive to promote economic growth. Whether the EU will continue to find British law adequate is an open…
-
UK Passes Data Access and Use Regulation Bill
Government Says Bill Will ‘Pump 10 Billion Pounds’ Into Economy. The UK government passed the Data Use and Access Bill that will introduce a host of privacy changes intended at making data processing more lenient with a motive to promote economic growth. Whether the EU will continue to find British law adequate enough is an…
-
How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance
The U.S. Department of Health and Human Services (HHS) is rolling out new HIPAA regulations in 2025. It’s designed to strengthen patient privacy and security in the face of these changes. These HIPAA updates are a response to the rise of telemedicine, the growing use of electronic health records (EHR), and an alarming increase in……
-
FTC reminds car dealers to protect customer data
The commission described how recently updated federal regulations affect dealerships — and their vendors. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ftc-car-dealers-data-security-reminder/750915/
-
Security, risk and compliance in the world of AI agents
Tags: access, ai, api, attack, automation, business, compliance, control, credentials, data, encryption, finance, framework, governance, grc, identity, infection, injection, ISO-27001, jobs, LLM, monitoring, password, privacy, regulation, resilience, risk, service, tool, trainingUnderstand and interpret natural language Access internal and external data sources dynamically Invoke tools (like APIs, databases, search engines) Carry memory to recall prior interactions or results Chain logic to reason through complex multi-step tasks They may be deployed through: Open-source frameworks like LangChain or Semantic Kernel Custom-built agent stacks powered by internal LLM APIs Hybrid orchestration models integrated across business platforms Real-world examples…
-
New COPPA Rules to Take Effect Over Child Data Privacy Concerns
New regulations and compliance standards for the Children’s Online Privacy Protection Act reflect how much technology has grown since the Federal Trade Commission last updated it in 2013. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/new-coppa-rules-children-data-privacy-concerns
-
Europe Is Elevating Cyber Resilience in Critical Infrastructure
Forrester’s McKay and van der Hout on How Regulations Are Driving Cyber Resilience. Security leaders worldwide are elevating resilience in cyber strategies, where Europe emerges as a frontrunner globally in protecting critical infrastructure. Driven by regulation such as NIS2 and DORA, its cybersecurity posture reflects strong resilience planning amid increasing disruptions. First seen on govinfosecurity.com…
-
India’s Security Leaders Struggle to Keep Up With Threats
Business and security executives in the South Asian nation worry over AI, cybersecurity, new digital privacy regulations, and a talent gap that hobbles innovation. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/india-security-leaders-struggle-threats
-
Trump executive order alters Biden-era cybersecurity regulations
First seen on scworld.com Jump to article: www.scworld.com/news/trump-executive-order-alters-biden-era-cybersecurity-regulations
-
UK cyber agency pushes for ‘strategic policy agenda’ as government efforts stall
Leaders at the U.K.’s National Cyber Security Centre are calling for more political attention on cybersecurity, arguing that regulation and legislation aren’t keeping up with technology. First seen on therecord.media Jump to article: therecord.media/ncsc-pushes-uk-government-create-strategic-cyber-policy-agenda
-
Boards Leave CISOs Exposed to Legal Risks
Attorney Jonathan Armstrong Says Board Diversity Must Include Cybersecurity Skills. Many boards lack cybersecurity expertise, leaving CISOs exposed to legal risks. New fraud laws and AI regulations compound the challenge as security leaders struggle for boardroom support, said Jonathan Armstrong, partner at Punter Southall Law. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/boards-leave-cisos-exposed-to-legal-risks-a-28621
-
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625476/UK-ICO-publishes-AI-and-biometrics-strategy
-
CIAM Across Industries: A Journey Through Digital Identity Neighborhoods
The rapid pace of technological change, evolving regulations, and shifting customer expectations require CIAM systems that can adapt and evolve over time. The organizations that build sustainable competitive advantages through CIAM are those that invest in flexible, extensible architectures that can accommodate future requirements without requiring complete system replacements. First seen on securityboulevard.com Jump to…
-
Finding Balance in US AI Regulation
The US can’t afford to wait for political consensus to catch up to technological change. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/finding-balance-us-ai-regulation
-
Satisfying Compliance Demands with Enhanced Cloud Security
Are You Navigating the Compliance Landscape Successfully? Compliance challenges where stringent data protection regulations reign supreme can indeed be daunting. Are companies adequately prepared to satisfy these demands? The potent mix of Non-Human Identities (NHIs) and Secrets Security Management might just be the key to unshackling organizations from these daunting conundrums. Demystifying Non-Human Identities (NHIs)……
-
#Infosec2025: Demand More of Your Vendors to Ease Quantum Transition, Say Experts
CISOs should demand more of their vendors and use regulation as an ally to persuade board members to accelerate the transition to post-quantum safety First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/infosec2025-vendors-quantum/
-
Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs
Edge computing and stricter regulations may usher in a new era of AI privacy. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/open-weight-chinese-ai-models-drive-privacy-innovation-llm
-
48% of security pros are falling behind compliance requirements
32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/02/software-compliance-regulations-requirements/
-
Code security in the AI era: Balancing speed and safety under new EU regulations
Tags: ai, compliance, cyber, finance, government, open-source, programming, regulation, resilience, risk, software, technology, tool, update, vulnerability, windowsThe regulatory response: EU Cyber Resilience Act European regulators have taken notice of these emerging risks. The EU Cyber Resilience Act is set to take full effect in December 2027, and it imposes comprehensive security requirements on manufacturers of any product that contains digital elements.Specifically, the act mandates security considerations at every stage of the…
-
AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report
Tags: ai, api, attack, authentication, awareness, breach, cloud, compliance, computing, control, crypto, cryptography, data, encryption, guide, malicious, malware, mfa, nist, passkey, phishing, privacy, programming, ransomware, regulation, risk, software, strategy, threat, tool, vulnerabilityAI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report madhav Tue, 05/27/2025 – 04:40 The Thales 2025 Data Threat Report reveals a critical inflection point in global cybersecurity. As the threat landscape grows more complex and hostile, the rapid adoption of generative AI is amplifying both opportunity and…
-
Decoding EASA Regulation Part-IS: A Comprehensive Guide to Strengthening Aviation Cybersecurity
What is EASA? EASA has long been synonymous with excellence in aviation safety. As the regulatory authority for the European Union, EASA sets the standards that govern everything from aircraft design to operational protocols. Its mission is clear: to ensure that every aspect of aviation is as safe and reliable as possible. Cybersecurity has emerged……
-
Bipartisan bill simplifying federal cyber regulations reintroduced
First seen on scworld.com Jump to article: www.scworld.com/brief/bipartisan-bill-simplifying-federal-cyber-regulations-reintroduced
-
Senators revive bill to harmonize conflicting cybersecurity regulations
The legislation Sens. Gary Peters and James Lankford would create an executive branch panel to align federal cyber rules. First seen on cyberscoop.com Jump to article: cyberscoop.com/senators-revive-bill-to-harmonize-conflicting-cybersecurity-regulations/
-
Regeneron Pledges Privacy Protection in $256M Bid for 23andMe
Regeneron’s acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/regeneron-pledge-privacy-23andme-acquisition
-
Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud
Tags: access, ai, application-security, attack, best-practice, breach, business, cloud, compliance, control, cyberattack, data, data-breach, dora, encryption, finance, framework, gartner, GDPR, google, ibm, infrastructure, international, mfa, network, PCI, phishing, privacy, regulation, risk, saas, service, strategy, threatYour Data, Your Responsibility: Securing Your Organization’s Future in the Cloud madhav Tue, 05/20/2025 – 04:37 Cloud adoption has fundamentally changed the way businesses operate, offering scalability, agility, and cost efficiencies that were unimaginable just a decade ago. But with this shift comes a necessary conversation: the cloud can also introduce complex security risks without…
-
4 ways to safeguard CISO communications from legal liabilities
Tags: ciso, communications, corporate, cyber, data, defense, governance, government, incident, jobs, law, privacy, regulation, risk, vulnerabilityPay attention to the medium: CISOs also need to pay attention to what they say based on the medium in which they are communicating. Pay attention to “how we communicate, who we’re communicating with, what platforms we’re communicating on, and whether it’s oral or written,” Angela Mauceri, corporate director and assistant general counsel for cyber…
-
Relaxing the Burden of Compliance with Automation
Does your Organization Struggle with Compliance? If so, you’re not alone. Compliance with cybersecurity regulations often involves navigating a complex web of rules, many of which are constantly changing. This can be a burdensome task for any organization, particularly those operating. But what if there was a way to alleviate this burden? Enter the field……

