AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cybersecurity legislation

Investigation finds violations by former chairman of Metropolitan District AuthorityUncovering systemic irregularities: an in-depth examination of MDC chairman's unauthorized actionsAn investigation reveals that William DiBella, former state senator and MDC chairman, violated agency rules by authorizing unnecessary legal work. Recommendations to prevent such violations in the future have been made.

Enhancing cybersecurity for Market Infrastructure InstitutionsStrengthening cyber defenses: safeguarding MIIs from growing threatsThis article highlights the importance of dark web monitoring for Market Infrastructure Institutions (MIIs) to combat cybersecurity threats. It discusses the significance of brand abuse and SEBI's comprehensive cybersecurity guidelines in protecting MIIs. By embracing these guidelines, MIIs can proactively...

New SEC rulemaking: everything companies need to know about cybersecurity compliance rulesHow to ensure cybersecurity compliance and protect company dataThe article explores the SEC's new rules on cybersecurity compliance, with a focus on measures companies must take to protect data. Google Cloud is recommended as a reliable solution for ensuring compliance and offering advanced security services. Preventative measures such as reviewing security policies...

The Digital Services Act (DSA) enters into force: a new landscape for large companiesA revolution in the regulation of the digital sector: all the obligations of large companies according to the Digital Services Act (DSA)The Digital Services Act (DSA) is new EU legislation that regulates digital services and imposes greater responsibilities on big companies like Meta (formerly Facebook) and Google. Objective: security, transparency and fight against illegal content.

Facebook users have little time to file for data privacy infringement claimsReserved $725 million to cover complaints from its active users between May 2007 and December 2022Facebook users run out of time to seek $725 million settlement over data privacy breach. It is essential to submit the application within the set deadline and to provide concrete evidence of the violation. The breach raised data security concerns and highlighted the importance of protecting user privacy....

Tesla sues former employees for disclosing user data to a german newspaperLawsuit against former Tesla employees for violation of customer privacyTesla filed a lawsuit against two former employees who allegedly disclosed sensitive data of more than 75,000 users to a german newspaper. This invasion of privacy could damage Tesla's reputation and put your safety at risk. The company took the incident seriously and will take all necessary legal steps...

Data Protection Law in India: privacy concernsConcerns are growing over India's new data protection lawIndia's parliament has passed a new data protection law, but there are concerns over privacy infringement. The law requires explicit consent for the collection and use of personal data, but critics fear the government could access the data indiscriminately. Additionally, overseas data retention arrangements...

The Ryanair case: the user profiling algorithm considered inadmissible according to UrsoThe issue of the use of personal data and the need for regulation to ensure respect for privacy and digital ethicsThe use of Ryanair's profiling algorithm is criticized by an expert in the sector for violating privacy and ethical principles. Urso emphasizes the importance of transparent and ethical practices to avoid legal disputes and maintain customer trust.

Interpol dismantles cyber criminals group: 2 million seizedA victorious battle against digital crime unlocked: Interpol fights against African cybercriminalsInterpol shut down a group of African cybercriminals and seized $2 million, putting an end to their illicit activities. The group operated internationally, carrying out cyber attacks such as data theft, financial fraud and intrusion into corporate networks. Thanks to international cooperation, numerous...

Data protection and privacy: a technical-regulatory dilemmaGDPR interpretation: challenges and complexities of data reuse in IT practicesThis article highlights the issues of privacy and data reuse in the digital age, in compliance with GDPR regulations. While data reuse is an essential process, ensuring anonymity and maintaining transparency is crucial to ensure compatibility with the original collection purposes. The tech industry must...

A data bridge between the US and the EU: the future of transatlantic e-commerce720 billion of euros on the table: let's find out how EU-US data exchange can revolutionize digital commerceThe article discusses a potential agreement between the European Union and the United States on data transfers, which could generate an economic gain of 720 billion euros. The deal could boost transatlantic ecommerce transactions, boost innovation, and ensure data protection and privacy.

US intelligence under scrutiny: the possible repercussions of section 702Section 702: technology implications and privacy challenges in times of surveillanceThe Biden administration could revise Section 702, a law that allows US intelligence agencies to monitor foreign communications without a warrant. The tech sector has expressed concerns about privacy and customer trust. The FBI has been accused of using the law to surveil American citizens. While the...

SEC: reactions to new cyber incident disclosure rulesChallenges and opportunities: expert comments on the new SEC guidelinesThe US Securities and Exchange Commission (SEC) has introduced guidelines requiring companies to disclose cyber incidents within four business days. The new regulation has sparked a debate among cybersecurity experts. While some voices are voicing concerns about privacy and information accuracy, others...

Clash of giants: the Guarantor blocks Threads, the new Meta social networkThe Meta Group runs into the networks of the Irish data protection supervisor: Threads in stand-byThe launch of the Threads app by Meta, the former Facebook, defined as "the anti Twitter", has been slowed down due to problems related to privacy and the use of personal data. Ireland's data protection supervisory authority (DPC) has raised these objections, given that Meta should have notified them...

The founder of the Russian cybersecurity company ChronoPay sentencedSeries of frauds and DDoS attacks: the top of the russian cybersecurity in the dockPavel Vrublevsky, founder of Russian cybersecurity company ChronoPay, has been sentenced to 14 years in prison for crimes of fraud and organized criminal activity. In 2010, he orchestrated a DDoS attack that disrupted air traffic in southern Russia. Despite his conviction, investigations continue into...

Privacy challenge: the impact of the UK's Online Safety Bill on Apple policiesThe Apple dilemma in the UK: user privacy Vs digital security lawsThe UK has revised its digital security law, forcing companies to make user communications accessible for investigation, putting encrypted services like iMessage and Apple's FaceTime at risk. If Apple were to relinquish, it could be forced to downsize or eliminate those services, impacting user trust...

NATO Cyber Defense: from Vilnius to future cyber scenariosChallenges and responses to the growing cyber threat: NATO's engagement in the cyber domainThe article highlights the importance of cyber defense for the security of NATO member nations. Discusses the evolution of cyber security, the effect of NATO's 2016 Cyber Defense Pledge and the ongoing need to improve and adapt to online threats. The future of cyber defense will be a key theme of NATO's...

Regulatory framework and personal data protection: reflections and developmentsEDPB considerations on the Data Privacy Framework: strengths and areas for improvementThe Data Privacy Framework, created to protect personal data, has received approval from the European Data Protection Board (EDPB), which however required further clarification. The EDPB raised issues regarding 'data minimisation', 'purpose limitation' and the risk assessment approach. Despite the critical...

Digital security in Italy: analysis of the Censis-IISFA reportCybersecurity: implications, training and strategies for the future according to the Censis-IISFA reportThe Censis-IISFA report in the Senate highlights the importance of a proactive approach to information security, underlining its economic and social implications. It suggests investments in training and research, implementation of data protection rules and collaboration between public and private...

Impact of new russian technology regulation: iPhones prematurely ejectedDigital sovereignty vs. globalization: the effects of the iPhone ban in RussiaApple's iPhone was recently banned in Russia due to concerns about cyber security and compliance with privacy regulations. This decision, which has generated controversy, has led to a debate on the balance between national security and technological globalization.

Daniel Kelley: from hacker to cybersecurity advocateTransformation and redemption: an ex-hacker's journey to cybersecurityThe article tells the story of Daniel Kelley, a Welsh ex-hacker known as "CRACKA". Although active in a collective of hackers responsible for attacks against the FBI and US Departments of Defense, Kelley was later arrested and convicted. Today, after serving his sentence, he uses his hacking skills to...

Meta: sanctions from the norwegian data controller and possible future repercussionsEffects of Datatilsynet's decision on Meta's advertising practice and possible future scenariosMeta, the owner of Facebook and Instagram, has been fined by Datatilsynet, the Norwegian data protection authority. The fine is 1 million Norwegian kroner per day for 3 months, starting on 4 August. The decision follows a July 4 ruling by the Court of Justice of the European Union, which required Meta...

Amazon and iRobot: the agreement slows down in the EU while the drone sector acceleratesClash of the titans in automation: Amazon and iRobot face strict EU regulationsThe expected deal between Amazon and iRobot has hit a bureaucratic hurdle in the EU, slowing the process. This could have strong implications for the future of mergers in the technology sector. Meanwhile, startups in the drone market continue to reap funding successes. Current legal and financial developments...

Cybersecurity and tax relief: a new paradigm for Italian companiesBoosting cyber defense investment: the implications of proposed tax cutsThe article describes an agenda presented by the Italian Parliament, which proposes tax relief for companies investing in cybersecurity. The goal is twofold: to protect corporate networks and stimulate the economy. However, there is a need for answers on how it will be implemented and monitored. The...

The national cybersecurity strategy of the United States: details and implicationsImplementing the National Cybersecurity Plan: a new era for US digital securityThe article analyzes the US National Cybersecurity Strategy Implementation Plan, which aims to strengthen protection against cyber threats. The plan identifies priorities, such as protection and recovery from cyber attacks, innovation in cyber security and international collaboration. Success will depend...

EU and US: new data transfer agreement approvedEuropean Commission advances despite concerns: promises of individual data protection and new opportunities for tech companiesThe European Commission has approved a deal allowing the transfer of trade data between the EU and the US. This decision affects tech giants like Facebook and Google, who have previously faced legal uncertainties over data transfers. The new agreement follows the US being recognized as a country with...

France: new law allows government surveillance of smartphonesDetails on the new french law and community reactionsFrance has adopted a law allowing police, with judicial approval, to remotely control smartphone cameras, microphones and GPS for investigations. This surveillance is mainly aimed at suspects in terrorism, delinquency and organized crime, and professions like doctors, journalists, lawyers, judges and...

Global fight against cybercrime: OPERA1ER tower fellFrench criminal organization loses its leader: Interpol announces high-profile arrest in international operation coded "Nervon"French-speaking hacker group OPERA1ER's senior member has been detained in an international operation, Nervone, initiated by Interpol. Suspected to have committed over 30 attacks across 15 countries, the group pilfered approximately $11-30 million. The operation tracked their signature spear-phishing...

Aviation safety 2.0: the new rules of cybersecurity in the aerospace sectorFrom a greater commitment at the federal level to the accountability of airport managersNew rules are being introduced in the aerospace sector following a renewed commitment to an adequate cybersecurity capability at the federal level. As reported by the Washington Post, these new directives will place responsibilities on airport managers - including small businesses - and require careful...

RBI record fine: Bank fined 65 lakhs for lack of cyber securityCooperative bank AP Mahesh penalized for serious cybersecurity shortcomings, highlighted by a breach that cost Rs 12.48 croreIndia's central banking institution, the Reserve Bank of India (RBI), has fined Hyderabad-based AP Mahesh urban cooperative bank Rs 65 lakh. The disciplinary action was taken following a cybersecurity breach which saw hackers infiltrate the bank's systems via phishing emails, stealing Rs 12.48 crore...

New Indian cyber security framework emerges from a ransomware attackCritical experience at AIIMS drives government to implement effective cyber defense framework in key industriesFormer National Cyber Security Coordinator, Lieutenant General Rajesh Pant has revealed that the ransomware attack on the All India Institute of Medical Sciences (AIIMS) prompted the Indian government to develop a nationwide cyber security response framework. national (NCRF). The incidence has highlighted...

Legal-technological convergence: a new paradigm for information securityBy combining legal and technological expertise, organizations and professionals are effectively addressing cyber threats in the evolving digital worldCybersecurity breaches are an inescapable reality, and when they occur, legislative frameworks and related obligations become crucial factors in determining accountability, as pointed out by Deo Falzon and Keith Cutajar. We live in an increasingly connected world, where the fields of law and technology...

OpenAI on trial: the question on the legality of data scrapingA recent California lawsuit against OpenAI has reignited a decades-old debate on the transparency and ethics of mass data collection on the webA lawsuit was filed recently in California against OpenAI, the artificial intelligence firm responsible for the popular ChatGPT app. This has reignited a decade-old debate about the legal and ethical concerns that arise from tech companies trying to scrape as much information as possible from everyone...

Fujitsu reprimanded by japanese government for insufficient cybersecurity measuresJapanese tech giant faces severe criticism for handling data breaches affecting 1,700 businesses and government agenciesFujitsu, the Japanese IT giant, has recently come under fire from Japanese authorities because of its weak cybersecurity measures that have led to data breaches affecting at least 1,700 companies and government agencies. Authorities on Friday asked Fujitsu to implement corrective measures to address...

Former network security chief arrested: diplomatic dilemma for KazakhstanNikita Kislitsyn, formerly the head of security for one of Russia's largest cybersecurity firms, has been arrested on decades-long hacking charges. Tensions between Russia, Kazakhstan and the Unite...Nikita Kislitsyn, the former head of network security for a major Russian cybersecurity firm, was arrested last week in Kazakhstan following hacking allegations dating back 10 years by the US Department of Justice. Experts believe Kislitsin's trial could soon create a diplomatic impasse for Kazakhstan's...

Cybersecurity priorities 2025: Biden's approach to investment and defenseUS administration sets cybersecurity budget priorities: focus on infrastructure defense, fighting ransomware, and software securityThe Biden administration recently outlined cybersecurity budget priorities for the 2025 fiscal year. The document, sent Tuesday to executive departments and agencies, intends to link cybersecurity investments to the five pillars of the national cybersecurity strategy, published today. beginning of March.Spending...

Facial recognition in Italy: the blockade extended until 2025Italian Senate confirms extended ban, offering longer cooling-off period to assess implications of AI on privacy and national securityThe Italian Senate recently gave its assent, following the approval of the Chamber, to the extension of the ban on facial recognition in the country until 2025. "From today the moratorium on the use of facial recognition technologies will last until 2025“, says Senator PD Filippo Sensi, previously i...

DHS releases new cybersecurity regulations: impact on policyholdersNew rules implemented by the US Department of Homeland Security introduce new requirements for protecting information and reporting cybersecurity incidentsThe United States Department of Homeland Security (DHS) recently issued new cybersecurity regulations with the goal of protecting controlled unclassified information (CUI). These long overdue regulations amend and add to the Homeland Security Acquisition Regulations (HSAR) and will be integrated into...

European Media Freedom Act: protection or danger for journalists?Despite aiming to safeguard press freedom, EMFA raises privacy concerns for journalists due to spyware exceptionOn 16 September 2022, the European Commission proposed a law, called the European Media Freedom Act (EMFA). This legislative act introduces a series of measures to guarantee freedom of the press. However, despite the changes and the Council's approval, the text includes an exception for the use of spyware...

Protection of Pirelli technology: the golden power of the italian government in actionThe government intervenes to safeguard user data privacy and national security in response to the interest of China National Tire and Rubber Corporation, Ltd. for Pirelli & CSpAIn the context of growing digitization and interconnection, the improper use of advanced technologies can pose a considerable risk not only for user privacy, but also for national security through the possible transfer of strategic information. This is the main reason for the decision taken by the Italian...

The European Union adopts a new regulation to strengthen cybersecurityThe political agreement establishes the creation of a security framework to protect EU data, networks and decision-making processes, with the strengthening of the mandate of CERT-EUThe Commission expresses its satisfaction with the political agreement obtained between the European Parliament and the EU Council on the Regulation, proposed by the Commission itself, which establishes measures for a high common level of cybersecurity in the institutions, bodies, offices and agencies...

Cybersecurity in India: a new chapter with CloudflareWith a mindset shift and the introduction of new regulations, India is taking significant steps to strengthen its position in the global cybersecurity landscapeTo understand how the cybersecurity landscape in India is evolving, we interviewed Fernando Serto, chief technologist and evangelist for the APJC at Cloudflare. While India is underperforming in terms of cybersecurity preparedness, being ranked 17th out of 20 on the MIT Cyber Defense Index and often...

British hacker convicted of 2020 Twitter attack: 5 years in prisonJoseph James O'Connor, aka PlugwalkJoe, convicted of massive Twitter hack, cryptocurrency fraud and cyberstalking, faces heavy legal repercussionsA British citizen involved in the massive Twitter hack that took place in July 2020 has been sentenced to five years in prison in the United States. Joseph James O'Connor, also known as PlugwalkJoe, 24, received his sentence on Friday in the Southern District of New York, just over a month after pleading...

The new US cyber security strategy: a sea change for critical infrastructureFrom strengthening the role of private business to the growth of cyber insurance, a detailed analysis of the revolutionary approach to cyber security in the United StatesIn the context of a growing national security priority related to the protection of critical infrastructure, on March 2, 2023, the Biden administration unveiled the National Cyber Security Strategy. This document represents a broad and forward-looking vision for both public and private cyber defenses....

Strengthening cyber security: a priority for the United States of AmericaPresident Garbarino highlights the need for expansion and renewal of the cyber workforce to counter emerging threatsToday, Subcommittee Chair on Cyber Security and Infrastructure Protection Andrew Garbarino delivered an introductory speech during a hearing on the need to expand the national cybersecurity workforce. He thanked all attendees for their presence and reiterated his main commitment as President: to address...

The EU steps up the security of 5G networks: plans and reactionsCollection of strategic measures to mitigate risks related to 5G networks, with emphasis on the measures taken against Chinese operators Huawei and ZTE and the geopolitical responseThe NIS Cooperation Group, the body responsible for the security of networks and information systems of the European Union, has released, with the support of Member States and ENISA, the second report regarding the implementation of the Toolbox on the security of 5G networks on 15 June 2023. The information...

The strengthening of the Personal Data Protection Authority has been postponedThe Italian government postpones the introduction of a law to strengthen the staff of the Guarantor for the protection of personal data, delaying the fight against illicit telemarketing and the dangers...The wait for a more robust Personal Data Protection Authority capable of better defending us against the abuses of telemarketing and the dangers of social media will be prolonged. The government has in fact decided to exclude the law which provided for the strengthening of this body. This measure was...

National Cybersecurity Agency annual report 2022: progress and challengesACN highlights developments in the cybersecurity industry, with a focus on digital protection, response and development, emphasizing international missions and partnershipsItaly's National Cybersecurity Agency (ACN) recently made its annual report available to the public, detailing the overall impact of its operations over the past year. The document, expressly required by the founding legislation and released to Members of Parliament, highlights ACN's actions, results...

Splinternet: the fragmentation of the internet and the future of the webThe growing division of cyberspace: how nations, laws and corporations affect the global structure of the webThe word "Armageddon", in the collective imagination, is a synonym for imminent catastrophe or unattainable disaster. While usually used in a religious context, we can borrow this term to describe a current phenomenon that is insidiously threatening the unity of the internet. Although the internet appears...

The impending cybersecurity revolution in the oil and gas industryRising governance expectations, heightened regulatory requirements, and the emergence of new trends outline a complex future for cybersecurity in the energy industryIn recent years, the oil and gas industry in the United States has witnessed a growing need for cybersecurity measures due to the ever-increasing cyber risks. This need has become even more pressing with the new information security directives issued by the Transportation Safety Administration (TSA)...