Tag: regulation
-
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
by
in SecurityNewsnoyb files complaints against TikTok, AliExpress, and other Chinese companies for illegal EU user data transfers to China, violating data protection laws. Austrian privacy non-profit group None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully…
-
DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
by
in SecurityNewsThe EU’s DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/dora-financial-firms-compliance/
-
Large Language Models and Regulations: Navigating the Ethical and Legal Landscape
by
in SecurityNewsLeverage the full potential of Large Language Models (LLMs) for your business while staying compliant. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/large-language-models-and-regulations-navigating-the-ethical-and-legal-landscape/
-
Biden Issues Final Maritime Cybersecurity Rules
by
in SecurityNewsWhite House Mandates Cyber Incident Response Plans Amid Growing Chinese Threat. Federal regulations unveiled Tuesday require the U.S. maritime industry to implement baseline cybersecurity measures amid concerns over exposure to attacks from adversaries such as China. The rules mandate cybersecurity plans and clearly-defined cyber positions in ports and maritime facilities. First seen on govinfosecurity.com Jump…
-
CISOs embrace rise in prominence, with broader business authority
by
in SecurityNews
Tags: ai, attack, business, ceo, cio, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, data, governance, healthcare, infrastructure, intelligence, network, privacy, regulation, risk, risk-management, security-incident, strategy, technology, threat, updateIt’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within the organization.According to CSO’s 2024 Security Priorities Study, 72% of security decision-makers say their role has grown to include additional responsibilities over the past…
-
SEC rule confusion continues to put CISOs in a bind a year after a major revision
by
in SecurityNews
Tags: attack, breach, business, ciso, citrix, compliance, control, cyber, cyberattack, cybersecurity, data, government, incident, incident response, law, network, privacy, regulation, risk, security-incident, software, strategy, supply-chainConfusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came into effect, experts say.As the agency that regulates and enforces federal US securities laws continues to flex its enforcement muscles against organizations that violate the strict rules,…
-
European Court Fines European Commission for Privacy Breach
by
in SecurityNewsTransfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
European Court Fines European Commission for Privacy Violation
by
in SecurityNewsTransfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
European Court Fines European Commission for GDPR Violation
by
in SecurityNewsTransfer of German Man’s IP Address Wins Him 400 Euros. European privacy regulation – bane of American technology companies and a favorite cudgel of activists – came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.…
-
Court orders European Commission to pay its first-ever GDPR fine
by
in SecurityNewsA German citizen will receive Euro400 from the European Commission for a violation of the General Data Privacy Regulation (GDPR), the first time the EU’s executive arm will pay such a fine.]]> First seen on therecord.media Jump to article: therecord.media/european-commission-pays-gdpr-fine-german-citizen
-
The biggest data breach fines, penalties, and settlements so far
by
in SecurityNews
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
IoT’s Regulatory Reckoning Is Overdue
by
in SecurityNewsNew security regulations are more than compliance hurdles, they’re opportunities to build better products, restore trust, and lead the next chapter of innovation. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/iot-regulatory-reckoning-overdue
-
More telecom firms were breached by Chinese hackers than previously reported
by
in SecurityNews
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
More stringent drone regulations proposed
by
in SecurityNews
Tags: regulationFirst seen on scworld.com Jump to article: www.scworld.com/brief/more-stringent-drone-regulations-proposed
-
Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation
by
in SecurityNewsThe outgoing chair weighs in on how the FCC has addressed newer technologies, efforts to respond to Chinese intrusions into U.S. telecom networks, and regulating AI in political ads. First seen on cyberscoop.com Jump to article: cyberscoop.com/fcc-jessica-rosenworcel-exit-interview-legacy-cybersecurity-ai/
-
Proposed HIPAA Amendments Will Close Healthcare Security Gaps
by
in SecurityNews
Tags: authentication, control, cybersecurity, healthcare, HIPAA, mfa, network, privacy, regulation, threatThe changes to the healthcare privacy regulation with technical controls such as network segmentation, multi-factor authentication, and encryption. The changes would strengthen cybersecurity protections for electronic health information and address evolving threats against healthcare entities. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/proposed-hipaa-amendments-close-healthcare-security-gaps
-
DORA Regulation (Digital Operational Resilience Act): A Threat Intelligence Perspective
by
in SecurityNewsThe Digital Operational Resilience Act (DORA) is coming in 2025. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/dora-regulation-digital-operational-resilience-act-a-threat-intelligence-perspective/
-
Cybersecurity regulations in 2025: Key insights from top industry experts
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/feature/how-will-rules-and-regulations-affect-cybersecurity-and-ai-in-2025
-
Tighter regulations proposed for foreign IT in drones used in US
by
in SecurityNewsThe Bureau of Industry and Security wants public feedback on how information technology in drones could pose a national security risk, particularly from adversaries such as China and Russia.]]> First seen on therecord.media Jump to article: therecord.media/proposed-drone-supply-chain-regulation-commerce-department
-
Why ISMS Policies Are Crucial for Compliance in Cybersecurity?
by
in SecurityNewsIn 2025, the cybersecurity landscape will continue to evolve rapidly, driven by increasing cyber threats and technological advancements. As governments and regulatory bodies implement stricter cybersecurity regulations, businesses will face pressure to ensure compliance. Failing to meet these standards could result in severe penalties, financial losses, and reputational damage. This blog will explore the key……
-
Regulations, security, and remote work: Why network outsourcing is booming
by
in SecurityNewsA growing number of enterprises in the US are adopting managed network services to support AI and other new technologies across increasingly complex networks, according to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/31/enterprise-networking-risks/
-
US Finalizes Rule Throttling Bulk Data Sales to China
by
in SecurityNewsRule Aims to Stymie Weaponization of Americans’ Data. The U.S. federal government finalized Friday regulations throttling the bulk commercial transfer to China and Russia of data pinpointing Americans’ location, their health data, or biometric and genomic identifiers. The rule implements a February executive order from President Joe Biden. First seen on govinfosecurity.com Jump to article:…
-
HIPAA to be updated with cybersecurity regulations, White House says
by
in SecurityNewsThe Biden administration is proposing an overhaul of the data security rules under the landmark Health Insurance Portability and Accountability Act (HIPAA).]]> First seen on therecord.media Jump to article: therecord.media/hipaa-cybersecurity-regulations-update
-
U.S. Finalizes Rule Throttling Bulk Data Sales to China
by
in SecurityNewsRule Aims to Stymie Weaponization of Americans’ Data. The U.S. federal government finalized Friday regulations throttling the bulk commercial transfer to China and Russia of data pinpointing Americans’ location, their health data, or biometric and genomic identifiers. The rule implements a February executive order from President Joe Biden. First seen on govinfosecurity.com Jump to article:…
-
Year In Review: Australia Expands Cyber Regulation
by
in SecurityNews2024 Marked the Government’s Increasing Role Mandating Cybersecurity. Australia announced a flurry of cybersecurity legislation and regulations in 2024, spotlighting the government’s intent to fortify the nation’s cybersecurity in the wake of the Medibank and Optus incidents. The government vowed to transform the country into the world’s most cyber-secure. First seen on govinfosecurity.com Jump to…
-
Top Cybersecurity Compliance Issues Businesses Face Today
by
in SecurityNewsAs organizations increasingly rely on digital infrastructure, the stakes have never been higher. Cybersecurity compliance is necessary to safeguard sensitive data, maintain customer trust, and avoid costly fines. With a constantly shifting threat landscape, evolving regulations, and the rise of new technologies, businesses must prioritize cybersecurity posture improvement to stay ahead of the curve. Assura”¦…
-
How Will Health Data Privacy, Cyber Regs Shape Up in 2025?
by
in SecurityNewsWashington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next presidential administration comes into office promising to reduce federal regulations, said attorney Melissa Crespo of law firm Morrison Foerster. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-will-health-data-privacy-cyber-regs-shape-up-in-2025-i-5431