Cybersecurity

Navigating India’s Digital Personal Data Protection ActN

Navigating India’s Digital Personal Data Protection Act

Discover how India’s Digital Personal Data Protection Act reshapes compliance, tackles data breaches, and enforces strict rules on data rights and cross-border transfers.

Lawsuit Reveals NSO's Pegasus Spyware Infected Meta's WhatsApp

Lawsuit Reveals NSO’s Pegasus Spyware Infected Meta’s WhatsApp

Even as WhatsApp adapted new defenses, Pegasus spyware from NSO Group continued to exploit vulnerabilities. Read more about the ongoing case.

The Consumer Financial Protection Bureau Calls for Closing Privacy Gaps in Financial Data

The Consumer Financial Protection Bureau Calls for Closing Privacy Gaps in Financial Data

Read more about how the Consumer Financial Protection Bureau has highlighted privacy gaps in financial data laws, urging states to strengthen protections and rethink exemptions for institutions under federal regulation.

Department of Homeland Security Framework Targets AI Risks in Infrastructure

Department of Homeland Security Framework Targets AI Risks in Infrastructure

The Department of Homeland Security has unveiled a framework addressing AI risks in infrastructure, highlighting vulnerabilities, safety measures, and tailored recommendations for key stakeholders.

Strengthening Healthcare Cybersecurity: The Health Infrastructure Security and Accountability Act

Strengthening Healthcare Cybersecurity: The Health Infrastructure Security and Accountability Act

Read how this new legislation targets healthcare cybersecurity, setting mandatory standards and audits to protect patient data, with funding to support compliance across the sector.

Mitigating Privacy Risks With Consent Management Platforms

Mitigating Privacy Risks With Consent Management Platforms

Discover how to avoid privacy violations with Consent Management Platforms (CMPs) by using network traffic analysis to detect failures and avoid costly litigation and regulatory issues.

Emerging Supply Chain Threat: Blockchain-Enabled Malware

Emerging Supply Chain Threat: Blockchain-Enabled Malware

Read how hackers deploy blockchain-enabled malware via NPM packages, bypassing traditional defenses and targeting developer environments in a new supply chain threat.

New US Software Security Standards Target Critical Infrastructure Protection

New US Software Security Standards Target Critical Infrastructure Protection

Discover how new software security standards, which demand safer code for critical infrastructure, push companies to adopt memory-safe practices or risk being deemed negligent.

Evolving Cyber Threat Landscape for the Post-Pandemic Insurance Industry

Evolving Cyber Threat Landscape for the Post-Pandemic Insurance Industry

Read how the post-pandemic insurance industry faces relentless cyber threats, new ransomware tactics, and regulatory demands to protect clients.

The Importance of Custom Dictionaries for Enhancing Password Security

The Importance of Custom Dictionaries for Enhancing Password Security

Easily-guessed passwords are an easy entry for hackers. Learn why incorporating custom dictionaries into the password policy nullifies that vulnerability.

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top