#regulatory-readiness

[ follow ]
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
Business intelligence
fromEntrepreneur
2 days ago

The Hidden Data Liability Every Leader Needs to Address Now

Data is no longer endlessly renewable; companies face a 'data liability gap' affecting AI systems and data recovery responsibilities.
#ai
Information security
fromHarvard Gazette
3 days ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
fromMedium
5 days ago
Artificial intelligence

How to mitigate the risk of AI implementation in enterprise environments

Artificial intelligence
fromwww.cbc.ca
4 days ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromTechzine Global
1 week ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromHarvard Gazette
3 days ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Artificial intelligence
fromwww.cbc.ca
4 days ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromTechzine Global
1 week ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
#cybersecurity
Careers
fromEntrepreneur
23 hours ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
DevOps
fromTheregister
3 days ago

Hybrid clouds have two attack surfaces - so watch both

Hybrid cloud management tools present significant security vulnerabilities that users often overlook.
DevOps
fromSecuritymagazine
4 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromBusiness Matters
2 days ago

Why Effective Patch Management Is Critical for Cybersecurity in 2026

Timely patch management is essential for protecting digital assets and maintaining business continuity against evolving cyber threats.
Healthcare
fromSecuritymagazine
2 weeks ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Careers
fromEntrepreneur
23 hours ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
DevOps
fromTheregister
3 days ago

Hybrid clouds have two attack surfaces - so watch both

Hybrid cloud management tools present significant security vulnerabilities that users often overlook.
DevOps
fromSecuritymagazine
4 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromBusiness Matters
2 days ago

Why Effective Patch Management Is Critical for Cybersecurity in 2026

Timely patch management is essential for protecting digital assets and maintaining business continuity against evolving cyber threats.
Healthcare
fromSecuritymagazine
2 weeks ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Poker
fromLondon Business News | Londonlovesbusiness.com
2 days ago

The hidden costs of gambling compliance: Why UK operators are spending millions on RegTech - London Business News | Londonlovesbusiness.com

The UK Gambling Commission's compliance actions have surged, driving growth in the RegTech sector and highlighting the need for improved compliance among operators.
#agentic-ai
Artificial intelligence
fromZDNET
2 days ago

Government adoption of AI agents could outpace the private sector

Agentic AI adoption in government is a leadership mandate, with 82% already using it and 71% planning to increase usage by 2026-2027.
Information security
fromHarvard Gazette
1 week ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromZDNET
2 days ago

Government adoption of AI agents could outpace the private sector

Agentic AI adoption in government is a leadership mandate, with 82% already using it and 71% planning to increase usage by 2026-2027.
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Information security
fromHarvard Gazette
1 week ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
#remote-work
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
2 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
fromTNW | Health-Tech
2 days ago
Healthcare

How AI Is Reshaping Workers' Compensation Claims and Healthcare Operations

Workers' compensation is a significant yet often overlooked part of the healthcare ecosystem, facing unique challenges and requiring focused innovation.
Marketing tech
fromThedrum
3 days ago

The GumGum Platform Achieves Global SOC 2 Compliance, Setting Standards for Data Security

GumGum achieved SOC 2 compliance, enhancing data security and system reliability for partners and customers globally.
Cryptocurrency
fromThe Village Voice
2 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
#ai-in-law
Law
fromAbove the Law
2 days ago

The Line We Cannot Cross: Where AI In Law Is Headed And Why Judgment Still Must Lead - Above the Law

AI is rapidly transforming legal work, automating tasks but unlikely to fully replace the lawyer's role in judgment and strategy.
Law
fromwww.theguardian.com
4 days ago

AI hallucinations found in high-profile Wall Street law firm filing

Sullivan & Cromwell admitted to filing errors in court due to AI-generated hallucinations, leading to inaccurate citations and misquotations.
Law
fromAbove the Law
2 days ago

The Line We Cannot Cross: Where AI In Law Is Headed And Why Judgment Still Must Lead - Above the Law

AI is rapidly transforming legal work, automating tasks but unlikely to fully replace the lawyer's role in judgment and strategy.
Law
fromwww.theguardian.com
4 days ago

AI hallucinations found in high-profile Wall Street law firm filing

Sullivan & Cromwell admitted to filing errors in court due to AI-generated hallucinations, leading to inaccurate citations and misquotations.
Privacy technologies
fromTheregister
2 days ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
#data-breach
France news
fromTechCrunch
3 days ago

France confirms data breach at government agency that manages citizens' IDs | TechCrunch

The French government agency ANTS confirmed a data breach affecting citizens' identity documents, potentially involving millions of personal records.
Privacy professionals
fromTheregister
5 days ago

Lovable denies data leak, cites 'intentional behavior'

Lovable's platform has a significant security flaw allowing free accounts to access sensitive user information, raising concerns about data protection.
France news
fromTechCrunch
3 days ago

France confirms data breach at government agency that manages citizens' IDs | TechCrunch

The French government agency ANTS confirmed a data breach affecting citizens' identity documents, potentially involving millions of personal records.
Privacy professionals
fromTheregister
5 days ago

Lovable denies data leak, cites 'intentional behavior'

Lovable's platform has a significant security flaw allowing free accounts to access sensitive user information, raising concerns about data protection.
Data science
fromInfoWorld
5 days ago

Addressing the challenges of unstructured data governance for AI

Enterprises must enhance data governance for unstructured data as AI transforms data management practices.
Fundraising
fromIndependent
5 days ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
Intellectual property law
fromAdExchanger
6 days ago

Why A 1967 Privacy Law Is Powering A New Wave Of Ad Tech Lawsuits | AdExchanger

CIPA, a 1967 law, has become a significant challenge for ad tech due to its private right of action and potential for high damages.
#privacy
fromAdExchanger
1 day ago
Privacy professionals

Does The New Federal Data Privacy Bill Have A Snowball's Chance Of Passing? | AdExchanger

Privacy professionals
fromAdExchanger
1 day ago

Does The New Federal Data Privacy Bill Have A Snowball's Chance Of Passing? | AdExchanger

House Republicans introduced the SECURE Data Act to create a national privacy standard that preempts state laws, targeting large data-handling companies.
Privacy professionals
fromSecuritymagazine
4 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
fromTNW | Eu
1 day ago
EU data protection

EU child safety push stalls as ePrivacy derogation expires, age verification app hacked, and CSA Regulation stuck in trilogue

Europe's child protection efforts conflict with privacy laws, complicating the detection of online child exploitation.
#ai-security
Information security
fromFortune
2 days ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
Information security
fromFortune
2 days ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
Healthcare
fromMedCity News
3 days ago

How the DOJ Is Tackling Fraud in the ACA Marketplace - MedCity News

Fraud targeting vulnerable populations in the Affordable Care Act Marketplace is a significant issue, with deceptive practices disrupting healthcare access.
fromSecuritymagazine
3 days ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
#uk-biobank
EU data protection
fromComputerWeekly.com
2 days ago

Medical data of half a million Britons on sale in China after Biobank breach | Computer Weekly

Medical data of 500,000 British citizens was offered for sale on a Chinese website after a breach at UK Biobank.
EU data protection
fromComputerWeekly.com
2 days ago

Medical data of half a million Britons on sale in China after Biobank breach | Computer Weekly

Medical data of 500,000 British citizens was offered for sale on a Chinese website after a breach at UK Biobank.
#data-security
Privacy professionals
fromwww.bbc.com
2 days ago

Biobank data incident caused by 'a few bad apples', boss says

BBC Datasets containing de-identified volunteer information were found for sale on Alibaba, prompting scrutiny and temporary suspension of access to the research platform.
Privacy professionals
fromwww.bbc.com
2 days ago

Biobank data incident caused by 'a few bad apples', boss says

BBC Datasets containing de-identified volunteer information were found for sale on Alibaba, prompting scrutiny and temporary suspension of access to the research platform.
#ai-governance
Artificial intelligence
fromFast Company
4 days ago

Here's how to jump-start your company's responsible AI governance in 90 days

Anthropic's Claude Mythos AI model reveals critical vulnerabilities, emphasizing the urgent need for responsible AI governance to mitigate risks and societal impacts.
Artificial intelligence
fromFast Company
4 days ago

Here's how to jump-start your company's responsible AI governance in 90 days

Anthropic's Claude Mythos AI model reveals critical vulnerabilities, emphasizing the urgent need for responsible AI governance to mitigate risks and societal impacts.
DevOps
fromwww.bankingdive.com
6 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
#data-privacy
fromNextgov.com
1 day ago
Privacy professionals

Tech bills of the week: Creating data privacy standards; Securing critical infrastructure from drones; and more

EU data protection
fromThedrum
5 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
fromwww.theguardian.com
4 days ago
Privacy professionals

Rental platform unnecessarily collected the data of millions of Australians, privacy commissioner finds

Excessive data collection by rental platforms increases tenant vulnerability, prompting calls for reduced personal information requirements.
Privacy professionals
fromNextgov.com
1 day ago

Tech bills of the week: Creating data privacy standards; Securing critical infrastructure from drones; and more

Republican lawmakers introduced two data privacy bills focusing on consumer control and national standards for data management.
Privacy professionals
fromThe Verge
2 days ago

A new Republican privacy bill could be 'worse than no standard at all'

Congress is attempting to pass a national data privacy law that may weaken protections in some states while strengthening them in others.
EU data protection
fromThedrum
5 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromwww.theguardian.com
4 days ago

Rental platform unnecessarily collected the data of millions of Australians, privacy commissioner finds

Excessive data collection by rental platforms increases tenant vulnerability, prompting calls for reduced personal information requirements.
EU data protection
fromTechCrunch
2 days ago

These are the countries moving to ban social media for children | TechCrunch

Countries are implementing social media bans for children to address risks like cyberbullying and mental health issues.
Artificial intelligence
fromFortune
3 days ago

Inflated AI Claims Are Under Fire-and the Regulatory Reckoning Is Coming | Fortune

Artificial intelligence is a significant capital markets issue, with regulators increasingly scrutinizing companies' claims about their AI capabilities.
Privacy professionals
fromArs Technica
1 day ago

Why are top university websites serving porn? It comes down to shoddy housekeeping.

Universities often neglect DNS record maintenance, leading to hijacked subdomains that can appear in search results.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
EU data protection
fromTechzine Global
4 days ago

New EU rules stall due to lack of data center data

Europe's data center sustainability regulations reveal significant gaps in data quality and reporting, hindering accurate assessments of energy consumption and environmental impact.
EU data protection
fromwww.theguardian.com
3 days ago

Some Interrail travellers told to cancel passports as hacked data posted online

Holidaymakers in Europe must replace passports after personal data was hacked and sold on the dark web, causing stress and financial burden.
Privacy professionals
fromReadWrite
3 days ago

Caesars sued over 2026 data breach claims

Caesars Entertainment faces a class action lawsuit for failing to protect customer data during a second cyber incident after a previous breach in 2023.
Information security
fromInfoWorld
2 days ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
Privacy professionals
fromFast Company
3 days ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
EU data protection
fromTechRepublic
5 days ago

EU to Classify ChatGPT as VLOSE Under Digital Services Act

ChatGPT may be classified as a 'Very Large Online Search Engine' under the Digital Services Act, imposing stricter compliance on OpenAI.
Artificial intelligence
fromTechRepublic
1 week ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#cyber-security
EU data protection
fromComputerWeekly.com
1 week ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Information security
fromComputerWeekly.com
3 days ago

Interview: Critical local infrastructure is missing link in UK cyber resilience | Computer Weekly

Local infrastructure in the UK is vulnerable to cyber attacks, risking severe disruption to essential services and public safety.
EU data protection
fromComputerWeekly.com
1 week ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Information security
fromComputerWeekly.com
3 days ago

Interview: Critical local infrastructure is missing link in UK cyber resilience | Computer Weekly

Local infrastructure in the UK is vulnerable to cyber attacks, risking severe disruption to essential services and public safety.
Information security
fromTechCrunch
3 days ago

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say | TechCrunch

Two spying campaigns exploit telecom infrastructure weaknesses to track individuals' locations, revealing ongoing vulnerabilities in global phone networks.
Information security
fromComputerWeekly.com
4 days ago

Anthropic's Mythos raises the stakes for security validation | Computer Weekly

The rise of autonomous AI in security introduces unpredictability, complicating the validation of defenses against evolving threats.
Information security
fromNextgov.com
3 days ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Privacy professionals
fromAdExchanger
2 weeks ago

What Regulators Talk About When They Talk About Ad Tech | AdExchanger

Privacy regulators emphasize protecting children, honoring opt-outs, and ensuring companies are transparent about data collection practices.
London startup
fromBusiness Matters
1 month ago

Strict Regulatory Frameworks Vs The Need For Rapid Digital Innovation

UK SMEs face mounting regulatory compliance demands while needing rapid innovation, creating operational tension between speed and safety in 2026.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromDbmaestro
5 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Information security
fromBusiness Matters
1 month ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
[ Load more ]