As Data Privacy Day 2026 approaches, organizations face an inflection point in privacy, artificial intelligence, and cybersecurity compliance.
As 2026 arrives, a singular truth becomes evident: Cybersecurity transcends the sole responsibility of any single team or ...
Industries without regulatory pressure often fail to self-regulate on cybersecurity, particularly when security investments ...
The IoT (Internet of Things) technology led to tremendous growing of the connected devices. This growing connected market required new approach of security certification which will meet the fast and ...
Cybersecurity is keeping business owners awake at night. The rise of artificial intelligence (AI) has opened new opportunities for progress, but it has also provided hackers with smarter tools to ...
Cyber threats are evolving by the minute. Attackers often adopt new methods in order to circumvent the new defenses. Public authorities should be taking the time to revise security protocols regularly ...
In 2025, Department of Justice (DOJ)’s Civil Cyber-Fraud Initiative drove major False Claims Act (FCA) settlements involving ...
"Another agency, another cybersecurity regulation to comply with.” That is the sentiment of many government cyber professionals. But do more regulations, standards and security to-do lists ...
Since the government announced in the King’s speech last year that it would bring forward a Cyber Security and Resilience Bill, much has changed. The geopolitical context has become more chaotic with ...
In 2024, the cybersecurity regulatory landscape underwent significant changes, as major economies worldwide introduced new rules to combat increasingly sophisticated cyber threats, such as advanced ...
LONDON--(BUSINESS WIRE)-- Although the European Digital Operational Resilience Act (DORA) and other Prudential Regulation Authority (PRA) measures offer increased resilience to organisations, new ...
Cybersecurity is in the spotlight this year for the derivatives industry after recent cyber events that impacted the market participants. Lynn Strongin Dodds assesses the status quo of cybersecurity ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results