AI DevwWrld Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cybersecurity legislation

A data bridge between the US and the EU: the future of transatlantic e-commerce720 billion of euros on the table: let's find out how EU-US data exchange can revolutionize digital commerceThe article discusses a potential agreement between the European Union and the United States on data transfers, which could generate an economic gain of 720 billion euros. The deal could boost transatlantic ecommerce transactions, boost innovation, and ensure data protection and privacy.

US intelligence under scrutiny: the possible repercussions of section 702Section 702: technology implications and privacy challenges in times of surveillanceThe Biden administration could revise Section 702, a law that allows US intelligence agencies to monitor foreign communications without a warrant. The tech sector has expressed concerns about privacy and customer trust. The FBI has been accused of using the law to surveil American citizens. While the...

SEC: reactions to new cyber incident disclosure rulesChallenges and opportunities: expert comments on the new SEC guidelinesThe US Securities and Exchange Commission (SEC) has introduced guidelines requiring companies to disclose cyber incidents within four business days. The new regulation has sparked a debate among cybersecurity experts. While some voices are voicing concerns about privacy and information accuracy, others...

Clash of giants: the Guarantor blocks Threads, the new Meta social networkThe Meta Group runs into the networks of the Irish data protection supervisor: Threads in stand-byThe launch of the Threads app by Meta, the former Facebook, defined as "the anti Twitter", has been slowed down due to problems related to privacy and the use of personal data. Ireland's data protection supervisory authority (DPC) has raised these objections, given that Meta should have notified them...

The founder of the Russian cybersecurity company ChronoPay sentencedSeries of frauds and DDoS attacks: the top of the russian cybersecurity in the dockPavel Vrublevsky, founder of Russian cybersecurity company ChronoPay, has been sentenced to 14 years in prison for crimes of fraud and organized criminal activity. In 2010, he orchestrated a DDoS attack that disrupted air traffic in southern Russia. Despite his conviction, investigations continue into...

Privacy challenge: the impact of the UK's Online Safety Bill on Apple policiesThe Apple dilemma in the UK: user privacy Vs digital security lawsThe UK has revised its digital security law, forcing companies to make user communications accessible for investigation, putting encrypted services like iMessage and Apple's FaceTime at risk. If Apple were to relinquish, it could be forced to downsize or eliminate those services, impacting user trust...

NATO Cyber Defense: from Vilnius to future cyber scenariosChallenges and responses to the growing cyber threat: NATO's engagement in the cyber domainThe article highlights the importance of cyber defense for the security of NATO member nations. Discusses the evolution of cyber security, the effect of NATO's 2016 Cyber Defense Pledge and the ongoing need to improve and adapt to online threats. The future of cyber defense will be a key theme of NATO's...

Regulatory framework and personal data protection: reflections and developmentsEDPB considerations on the Data Privacy Framework: strengths and areas for improvementThe Data Privacy Framework, created to protect personal data, has received approval from the European Data Protection Board (EDPB), which however required further clarification. The EDPB raised issues regarding 'data minimisation', 'purpose limitation' and the risk assessment approach. Despite the critical...

Digital security in Italy: analysis of the Censis-IISFA reportCybersecurity: implications, training and strategies for the future according to the Censis-IISFA reportThe Censis-IISFA report in the Senate highlights the importance of a proactive approach to information security, underlining its economic and social implications. It suggests investments in training and research, implementation of data protection rules and collaboration between public and private...

Impact of new russian technology regulation: iPhones prematurely ejectedDigital sovereignty vs. globalization: the effects of the iPhone ban in RussiaApple's iPhone was recently banned in Russia due to concerns about cyber security and compliance with privacy regulations. This decision, which has generated controversy, has led to a debate on the balance between national security and technological globalization.

Daniel Kelley: from hacker to cybersecurity advocateTransformation and redemption: an ex-hacker's journey to cybersecurityThe article tells the story of Daniel Kelley, a Welsh ex-hacker known as "CRACKA". Although active in a collective of hackers responsible for attacks against the FBI and US Departments of Defense, Kelley was later arrested and convicted. Today, after serving his sentence, he uses his hacking skills to...

Meta: sanctions from the norwegian data controller and possible future repercussionsEffects of Datatilsynet's decision on Meta's advertising practice and possible future scenariosMeta, the owner of Facebook and Instagram, has been fined by Datatilsynet, the Norwegian data protection authority. The fine is 1 million Norwegian kroner per day for 3 months, starting on 4 August. The decision follows a July 4 ruling by the Court of Justice of the European Union, which required Meta...

Amazon and iRobot: the agreement slows down in the EU while the drone sector acceleratesClash of the titans in automation: Amazon and iRobot face strict EU regulationsThe expected deal between Amazon and iRobot has hit a bureaucratic hurdle in the EU, slowing the process. This could have strong implications for the future of mergers in the technology sector. Meanwhile, startups in the drone market continue to reap funding successes. Current legal and financial developments...

Cybersecurity and tax relief: a new paradigm for Italian companiesBoosting cyber defense investment: the implications of proposed tax cutsThe article describes an agenda presented by the Italian Parliament, which proposes tax relief for companies investing in cybersecurity. The goal is twofold: to protect corporate networks and stimulate the economy. However, there is a need for answers on how it will be implemented and monitored. The...

The national cybersecurity strategy of the United States: details and implicationsImplementing the National Cybersecurity Plan: a new era for US digital securityThe article analyzes the US National Cybersecurity Strategy Implementation Plan, which aims to strengthen protection against cyber threats. The plan identifies priorities, such as protection and recovery from cyber attacks, innovation in cyber security and international collaboration. Success will depend...

EU and US: new data transfer agreement approvedEuropean Commission advances despite concerns: promises of individual data protection and new opportunities for tech companiesThe European Commission has approved a deal allowing the transfer of trade data between the EU and the US. This decision affects tech giants like Facebook and Google, who have previously faced legal uncertainties over data transfers. The new agreement follows the US being recognized as a country with...

France: new law allows government surveillance of smartphonesDetails on the new french law and community reactionsFrance has adopted a law allowing police, with judicial approval, to remotely control smartphone cameras, microphones and GPS for investigations. This surveillance is mainly aimed at suspects in terrorism, delinquency and organized crime, and professions like doctors, journalists, lawyers, judges and...

Global fight against cybercrime: OPERA1ER tower fellFrench criminal organization loses its leader: Interpol announces high-profile arrest in international operation coded "Nervon"French-speaking hacker group OPERA1ER's senior member has been detained in an international operation, Nervone, initiated by Interpol. Suspected to have committed over 30 attacks across 15 countries, the group pilfered approximately $11-30 million. The operation tracked their signature spear-phishing...

Aviation safety 2.0: the new rules of cybersecurity in the aerospace sectorFrom a greater commitment at the federal level to the accountability of airport managersNew rules are being introduced in the aerospace sector following a renewed commitment to an adequate cybersecurity capability at the federal level. As reported by the Washington Post, these new directives will place responsibilities on airport managers - including small businesses - and require careful...

RBI record fine: Bank fined 65 lakhs for lack of cyber securityCooperative bank AP Mahesh penalized for serious cybersecurity shortcomings, highlighted by a breach that cost Rs 12.48 croreIndia's central banking institution, the Reserve Bank of India (RBI), has fined Hyderabad-based AP Mahesh urban cooperative bank Rs 65 lakh. The disciplinary action was taken following a cybersecurity breach which saw hackers infiltrate the bank's systems via phishing emails, stealing Rs 12.48 crore...

New Indian cyber security framework emerges from a ransomware attackCritical experience at AIIMS drives government to implement effective cyber defense framework in key industriesFormer National Cyber Security Coordinator, Lieutenant General Rajesh Pant has revealed that the ransomware attack on the All India Institute of Medical Sciences (AIIMS) prompted the Indian government to develop a nationwide cyber security response framework. national (NCRF). The incidence has highlighted...

Legal-technological convergence: a new paradigm for information securityBy combining legal and technological expertise, organizations and professionals are effectively addressing cyber threats in the evolving digital worldCybersecurity breaches are an inescapable reality, and when they occur, legislative frameworks and related obligations become crucial factors in determining accountability, as pointed out by Deo Falzon and Keith Cutajar. We live in an increasingly connected world, where the fields of law and technology...

OpenAI on trial: the question on the legality of data scrapingA recent California lawsuit against OpenAI has reignited a decades-old debate on the transparency and ethics of mass data collection on the webA lawsuit was filed recently in California against OpenAI, the artificial intelligence firm responsible for the popular ChatGPT app. This has reignited a decade-old debate about the legal and ethical concerns that arise from tech companies trying to scrape as much information as possible from everyone...

Fujitsu reprimanded by japanese government for insufficient cybersecurity measuresJapanese tech giant faces severe criticism for handling data breaches affecting 1,700 businesses and government agenciesFujitsu, the Japanese IT giant, has recently come under fire from Japanese authorities because of its weak cybersecurity measures that have led to data breaches affecting at least 1,700 companies and government agencies. Authorities on Friday asked Fujitsu to implement corrective measures to address...

Former network security chief arrested: diplomatic dilemma for KazakhstanNikita Kislitsyn, formerly the head of security for one of Russia's largest cybersecurity firms, has been arrested on decades-long hacking charges. Tensions between Russia, Kazakhstan and the Unite...Nikita Kislitsyn, the former head of network security for a major Russian cybersecurity firm, was arrested last week in Kazakhstan following hacking allegations dating back 10 years by the US Department of Justice. Experts believe Kislitsin's trial could soon create a diplomatic impasse for Kazakhstan's...

Cybersecurity priorities 2025: Biden's approach to investment and defenseUS administration sets cybersecurity budget priorities: focus on infrastructure defense, fighting ransomware, and software securityThe Biden administration recently outlined cybersecurity budget priorities for the 2025 fiscal year. The document, sent Tuesday to executive departments and agencies, intends to link cybersecurity investments to the five pillars of the national cybersecurity strategy, published today. beginning of March.Spending...

Facial recognition in Italy: the blockade extended until 2025Italian Senate confirms extended ban, offering longer cooling-off period to assess implications of AI on privacy and national securityThe Italian Senate recently gave its assent, following the approval of the Chamber, to the extension of the ban on facial recognition in the country until 2025. "From today the moratorium on the use of facial recognition technologies will last until 2025“, says Senator PD Filippo Sensi, previously i...

DHS releases new cybersecurity regulations: impact on policyholdersNew rules implemented by the US Department of Homeland Security introduce new requirements for protecting information and reporting cybersecurity incidentsThe United States Department of Homeland Security (DHS) recently issued new cybersecurity regulations with the goal of protecting controlled unclassified information (CUI). These long overdue regulations amend and add to the Homeland Security Acquisition Regulations (HSAR) and will be integrated into...

European Media Freedom Act: protection or danger for journalists?Despite aiming to safeguard press freedom, EMFA raises privacy concerns for journalists due to spyware exceptionOn 16 September 2022, the European Commission proposed a law, called the European Media Freedom Act (EMFA). This legislative act introduces a series of measures to guarantee freedom of the press. However, despite the changes and the Council's approval, the text includes an exception for the use of spyware...

Protection of Pirelli technology: the golden power of the italian government in actionThe government intervenes to safeguard user data privacy and national security in response to the interest of China National Tire and Rubber Corporation, Ltd. for Pirelli & CSpAIn the context of growing digitization and interconnection, the improper use of advanced technologies can pose a considerable risk not only for user privacy, but also for national security through the possible transfer of strategic information. This is the main reason for the decision taken by the Italian...

The European Union adopts a new regulation to strengthen cybersecurityThe political agreement establishes the creation of a security framework to protect EU data, networks and decision-making processes, with the strengthening of the mandate of CERT-EUThe Commission expresses its satisfaction with the political agreement obtained between the European Parliament and the EU Council on the Regulation, proposed by the Commission itself, which establishes measures for a high common level of cybersecurity in the institutions, bodies, offices and agencies...

Cybersecurity in India: a new chapter with CloudflareWith a mindset shift and the introduction of new regulations, India is taking significant steps to strengthen its position in the global cybersecurity landscapeTo understand how the cybersecurity landscape in India is evolving, we interviewed Fernando Serto, chief technologist and evangelist for the APJC at Cloudflare. While India is underperforming in terms of cybersecurity preparedness, being ranked 17th out of 20 on the MIT Cyber Defense Index and often...

British hacker convicted of 2020 Twitter attack: 5 years in prisonJoseph James O'Connor, aka PlugwalkJoe, convicted of massive Twitter hack, cryptocurrency fraud and cyberstalking, faces heavy legal repercussionsA British citizen involved in the massive Twitter hack that took place in July 2020 has been sentenced to five years in prison in the United States. Joseph James O'Connor, also known as PlugwalkJoe, 24, received his sentence on Friday in the Southern District of New York, just over a month after pleading...

The new US cyber security strategy: a sea change for critical infrastructureFrom strengthening the role of private business to the growth of cyber insurance, a detailed analysis of the revolutionary approach to cyber security in the United StatesIn the context of a growing national security priority related to the protection of critical infrastructure, on March 2, 2023, the Biden administration unveiled the National Cyber Security Strategy. This document represents a broad and forward-looking vision for both public and private cyber defenses....

Strengthening cyber security: a priority for the United States of AmericaPresident Garbarino highlights the need for expansion and renewal of the cyber workforce to counter emerging threatsToday, Subcommittee Chair on Cyber Security and Infrastructure Protection Andrew Garbarino delivered an introductory speech during a hearing on the need to expand the national cybersecurity workforce. He thanked all attendees for their presence and reiterated his main commitment as President: to address...

The EU steps up the security of 5G networks: plans and reactionsCollection of strategic measures to mitigate risks related to 5G networks, with emphasis on the measures taken against Chinese operators Huawei and ZTE and the geopolitical responseThe NIS Cooperation Group, the body responsible for the security of networks and information systems of the European Union, has released, with the support of Member States and ENISA, the second report regarding the implementation of the Toolbox on the security of 5G networks on 15 June 2023. The information...

The strengthening of the Personal Data Protection Authority has been postponedThe Italian government postpones the introduction of a law to strengthen the staff of the Guarantor for the protection of personal data, delaying the fight against illicit telemarketing and the dangers...The wait for a more robust Personal Data Protection Authority capable of better defending us against the abuses of telemarketing and the dangers of social media will be prolonged. The government has in fact decided to exclude the law which provided for the strengthening of this body. This measure was...

National Cybersecurity Agency annual report 2022: progress and challengesACN highlights developments in the cybersecurity industry, with a focus on digital protection, response and development, emphasizing international missions and partnershipsItaly's National Cybersecurity Agency (ACN) recently made its annual report available to the public, detailing the overall impact of its operations over the past year. The document, expressly required by the founding legislation and released to Members of Parliament, highlights ACN's actions, results...

Splinternet: the fragmentation of the internet and the future of the webThe growing division of cyberspace: how nations, laws and corporations affect the global structure of the webThe word "Armageddon", in the collective imagination, is a synonym for imminent catastrophe or unattainable disaster. While usually used in a religious context, we can borrow this term to describe a current phenomenon that is insidiously threatening the unity of the internet. Although the internet appears...

The impending cybersecurity revolution in the oil and gas industryRising governance expectations, heightened regulatory requirements, and the emergence of new trends outline a complex future for cybersecurity in the energy industryIn recent years, the oil and gas industry in the United States has witnessed a growing need for cybersecurity measures due to the ever-increasing cyber risks. This need has become even more pressing with the new information security directives issued by the Transportation Safety Administration (TSA)...

ISO/IEC 27001:2022: changes and comparison with the GDPRIn-depth analysis of the structure of ISO/IEC 27001:2022, its key frameworks, its impact on data protection and comparison with EU regulation 2016/679The publication of ISO/IEC 27001:2022 - "Information security, cybersecurity and privacy protection - Information security management systems - Requirements" represents a significant advance in information security management. This international standard, released in October 2022, particularly emphasizes...

EU contemplates Huawei ban in 5G networks: security and economic dependence on ChinaIn response to the security risks, the European Union is considering excluding Huawei from the development of next-generation networksThe idea is emerging in Brussels of prohibiting European Union countries from using companies that could compromise the security of next-generation telecommunications networks, including Huawei. According to sources reported by the Financial Times, the European Commission would be examining the possibility...

New law to strengthen international cooperation on cyber securityUS senators propose international cyber partner act to enhance global response to cyber attacks, protecting critical infrastructure and promoting cross-border cooperationOn June 7, Senators Gary Peters, a Democrat of Michigan, and James Lankford, a Republican of Oklahoma, introduced a bipartisan bill to improve the Cybersecurity and Infrastructure Security Agency's (CISA) ability to work with partners conferences on cyber security issues. This move was born out of a...

Meta sanctioned: IDPC enforces EU to US data transfer blockMajor Irish verdict clashes with social media giant over data protection, potentially disrupting Facebook services in EuropeOn May 12, 2023, the Irish Data Protection Commission (IDPC) made a significant decision against Meta Platforms Ireland Ltd, formerly known as Facebook. The case concerns the transmission of personal data, some of which are sensitive, of Facebook users located in the European Union (EU) to the parent...

Privacy Guarantor against uncontrolled telemarketing: heavy fines for TIM, Green Network and Sorg...An unprecedented offensive against wild telemarketing involves major telecommunications and energy players. Corrective and punitive measures aim to clean up the industry and protect consumer rightsThe Privacy Guarantor continues his crusade against uncontrolled telemarketing with determination. It has recently carried out the confiscation of the databases of some call centers in Veneto and Tuscany, which have been guilty of violations of privacy and consent collection regulations. Today, the agency...

Fighting cybercrime: the role of the second additional protocol to the Budapest ConventionAn in-depth look at article 6: a powerful tool for international cooperation in cybercrime investigationsCybercrime represents one of the most pervasive and constant threats in the global security landscape. Given the large transnational nature of these crimes, international cooperation is essential. The Second Additional Protocol to the Budapest Convention aims to strengthen international collaboration...

$1.2 million settlement over cybersecurity breaches at cryptocurrency platformThe New York Department of Financial Services fines a major crypto trading platform for lapses in its cybersecurity programOn May 1, the New York Department of Financial Services (NYDFS or "Department") reached an agreement with a trading platform to address deficiencies found during inspections conducted in 2018 and 2020. The agreement focused on several issues related to the company's cybersecurity program and resulted...

OneMain financial hit with $4.25M fine over cybersecurity lapsesNYDFS imposes multimillion penalty on lender for alleged violations of the cybersecurity regulationThe New York Department of Financial Services (NYDFS) has recently publicized a $4.25 million fine against OneMain Financial Group LLC. The reason behind this stringent measure relates to OneMain's alleged violations of the Cybersecurity Regulation, also known as 23 NYCRR Part 500.Specific information...

Artificial intelligence regulation in China: the new draft measuresChina aims for broader control over generative AI: focus on core socialist values, regulation of training data and protection of users rightsJust four months after the first legislative measures regarding AI, called "Deep Synthesis Measures on Internet Information Services Administration", the CAC (Cybersecurity Administration of China) introduced the "Deep Synthesis Measures". AI draft". This sudden return to the legislative table appears...

The national cybersecurity strategy: protection, resilience and digital autonomy for ItalyTackling cyber threats, promoting the national economy and spreading a culture of security to guarantee the country's digital futureOn May 18, the National Cybersecurity Strategy (2022-2026) was approved by the ACN (National Cybersecurity Agency) during a meeting of the Interministerial Cybersecurity Committee chaired by Prime Minister Mario Draghi. This decision was taken at a time of emergency for the cyber attacks that have hit...