Cybersecurity
Read how this new legislation targets healthcare cybersecurity, setting mandatory standards and audits to protect patient data, with funding to support compliance across the sector.
Discover how to avoid privacy violations with Consent Management Platforms (CMPs) by using network traffic analysis to detect failures and avoid costly litigation and regulatory issues.
Read how hackers deploy blockchain-enabled malware via NPM packages, bypassing traditional defenses and targeting developer environments in a new supply chain threat.
Discover how new software security standards, which demand safer code for critical infrastructure, push companies to adopt memory-safe practices or risk being deemed negligent.
Read how the post-pandemic insurance industry faces relentless cyber threats, new ransomware tactics, and regulatory demands to protect clients.
Easily-guessed passwords are an easy entry for hackers. Learn why incorporating custom dictionaries into the password policy nullifies that vulnerability.
Learn how threat exposure management prioritizes risk, streamlines security tools, and mitigates vulnerabilities before exploitation.
As the 2025 deadline nears, financial institutions must act now to meet DORA compliance by enhancing information and communication technology (ICT) resilience and mitigating third-party risks.
The Federal Energy Regulatory Commission has proposed cybersecurity rules to enhance data protection for the US electric grid, expanding monitoring to better detect threats outside traditional security zones.
Learn how to navigate legal risk during AI implementation by aligning AI tools with business goals and building trust for successful technology adoption.
Get our free daily newsletter
Subscribe for the latest news and business legal developments.