News

The cybersecurity tools, policies and knowledge to protect personal data exist – but people’s and institutions’ use of them ...
Data privacy, cybersecurity, and data breach risks are important due diligence issues in mergers and acquisitions. Post-acquisition discovery of security problems, and even notifiable breaches, is ...
The use of those data driven technologies cause privacy and cyber security concerns, ... For example, ISO and NIST have cybersecurity guidance for companies in all industries.
The last example gives the most pause to privacy legal observers given its outright lack of specificity, unbounded intent, and essentially limitless possibilities for misuse.
To mitigate these types of privacy risks, establishing an AI steering committee with key business, data science, analytics, information security and information technology stakeholders is critical.
In addition, U.S. federal regulators are all but certain to prioritize regulation and enforcement when privacy, cybersecurity, and advanced technologies intersect with national security.
As part of the NSW Cyber Security Policy, agencies are now required by August 31 each year to assess their maturity against the Australian Cyber Security Centre's (ACSC) Essential 8.
The philosophy behind the UK’s new National Cyber Security Centre was set out by the centre’s technical director, Dr Ian Levy, speaking at the Wired Security conference in London yesterday.. A ...
A cybersecurity expert warns against oversharing with AI chatbots like ChatGPT and Google's Gemini. Chat data can be used to train generative AI and can make personal data searchable. Many ...
Cybersecurity stays in the spotlight as new laws emerge, yet many continue to lose ground in protecting data privacy every ...