Cybersecurity / Privacy regulations

Weekly Cybersecurity / Privacy regulations Insights

Stay ahead with our expertly curated weekly insights on the latest trends, developments, and news in Cybersecurity - Privacy regulations.

Recent Articles

Sort Options:

Beyond the checklist: why a data privacy culture outperforms policy every time

Beyond the checklist: why a data privacy culture outperforms policy every time

Organizations must prioritize data protection as a shared responsibility, not just a compliance issue. Effective training and a strong culture of understanding the 'why' behind policies are essential for mitigating risks and maintaining trust in today's data-driven landscape.


What does it mean to have a 'data privacy culture' beyond just following policies?
A data privacy culture means embedding the understanding and importance of data protection into the everyday mindset and behaviors of all employees, not just adhering to formal policies or compliance checklists. It involves leadership communicating the 'why' behind data protection, continuous role-specific training, and encouraging open discussions about data privacy risks and decisions, making data protection a shared responsibility across the organization.
Sources: [1]
Why is leadership important in building a strong data privacy culture?
Leadership is crucial because it sets the tone and priority for data privacy within the organization. When executives clearly communicate the value of data protection and integrate it into business decisions, it signals to all employees that privacy is a core organizational value. This top-down commitment helps foster a shared sense of accountability and vigilance, which is essential for reducing risks and maintaining customer trust.
Sources: [1], [2]

25 July, 2025
TechRadar

New York Seeking Public Opinion on Water Systems Cyber Regulations

New York Seeking Public Opinion on Water Systems Cyber Regulations

New York is seeking public input on proposed cyber regulations for water systems, focusing on incident reporting, response plans, cybersecurity controls, and compliance training. This initiative aims to enhance the security and resilience of critical water infrastructure.


What types of water systems are affected by the proposed cybersecurity regulations in New York?
The proposed regulations apply to water and wastewater utilities in New York State that serve more than 3,300 people. Larger utilities serving over 50,000 customers have additional requirements, such as designating a cybersecurity program leader and implementing network monitoring and logging.
Sources: [1], [2]
What are the key cybersecurity requirements proposed for water and wastewater utilities in New York?
The key requirements include implementing cybersecurity incident response plans, reporting incidents to the Department of Health within 24 hours, conducting annual cybersecurity vulnerability assessments, establishing formal cybersecurity programs, ensuring network monitoring and logging, and providing mandatory cybersecurity training for certified wastewater operators.
Sources: [1], [2]

24 July, 2025
SecurityWeek

Compliance is evolving — Is your resilience ready?

Compliance is evolving — Is your resilience ready?

The evolving role of privacy professionals now encompasses cyber security compliance, driven by new regulations like NIS2 and DORA. These changes demand enhanced resilience and risk management, highlighting the importance of strategic security solutions in today's complex IT landscape.


What are the main differences between NIS2 and DORA regulations?
NIS2 is a directive aimed at strengthening cybersecurity across a broad range of essential and important sectors such as energy, healthcare, and transport, focusing on risk management, incident reporting, and governance. DORA is a regulation specifically targeting the financial sector, emphasizing operational resilience through rigorous ICT risk management, resilience testing, and incident reporting. While NIS2 sets broader cybersecurity objectives, DORA mandates more prescriptive and detailed requirements, including annual security testing and specific incident reporting timelines. DORA also overrides NIS2 in overlapping areas for entities subject to both regulations.
What are the incident reporting requirements under NIS2 and DORA?
Both NIS2 and DORA require organizations to report cybersecurity incidents in multiple stages, but their timelines and definitions differ. Under NIS2, entities must notify authorities within 24 hours of becoming aware of an incident, provide a detailed report within 72 hours, and submit a final report within one month. DORA also requires three reports but allows more flexible deadlines set by competent authorities, focusing on incidents that impact critical or important financial services. The definitions of reportable incidents vary, with NIS2 having a broader scope and DORA focusing on major ICT-related incidents affecting financial sector functions.

18 July, 2025
TechRadar

Safeguarding Customer Information Policy

Safeguarding Customer Information Policy

A new policy outlines essential standards for safeguarding customers' proprietary and consumer information. This customizable six-page document provides expert guidance on security responsibilities, awareness, and training programs to enhance cybersecurity measures effectively.


What are the key components of a reasonable information security program under a safeguarding customer information policy?
A reasonable information security program typically includes strong authentication and access controls such as multi-factor authentication, data masking and anonymization techniques like tokenization and pseudonymization, employee training and awareness programs, and procedures to protect against unauthorized access or data breaches. It also involves regular updates to security measures to keep pace with evolving technology and threats.
Sources: [1], [2]
Who is required to comply with safeguarding customer information policies and what are their responsibilities?
Entities covered by safeguarding customer information policies, such as financial firms under SEC Regulation S-P or businesses subject to the FTC Safeguards Rule, must implement safeguards to protect customer information. Their responsibilities include maintaining security and confidentiality of customer data, protecting against anticipated threats, providing privacy notices to customers, and reporting certain data breaches. They must also develop identity theft prevention programs and ensure employee training on security practices.
Sources: [1], [2]

26 June, 2025
Cybersecurity | TechRepublic

I am a data security expert and here are 5 lessons on cyber security from the Legal Aid Agency cyberattack

I am a data security expert and here are 5 lessons on cyber security from the Legal Aid Agency cyberattack

The recent cyber-attack on the UK's Legal Aid Agency exposed sensitive personal data of over two million individuals, highlighting the urgent need for enhanced cybersecurity measures. Experts emphasize a proactive, board-level approach to managing evolving cyber threats and vulnerabilities.


What types of personal data were compromised in the Legal Aid Agency cyberattack?
The cyberattack exposed deeply personal and sensitive information including names, addresses, dates of birth, National Insurance numbers, criminal histories, financial records such as contribution amounts, debts, payments, and employment status of legal aid applicants dating back to 2010.
Why was the Legal Aid Agency vulnerable to such a large-scale cyberattack?
The Legal Aid Agency operated on ageing legacy infrastructure that was not designed to withstand modern cyberattack techniques. Key cybersecurity measures such as network segmentation, real-time monitoring, and zero-trust principles were either lacking or poorly enforced, making the agency a prime target for attackers.

19 June, 2025
TechRadar

China issues new regulations on facial recognition technology, effective June 1

China issues new regulations on facial recognition technology, effective June 1

China's Cyberspace Administration and Ministry of Public Security have introduced new regulations for facial recognition technology, effective June 1. These rules aim to standardize data processing and enhance personal information protection, establishing clear oversight and security standards.


What are the main objectives of China's new facial recognition regulations?
The main objectives of China's new facial recognition regulations are to ensure responsible deployment, enhance personal information protection, and establish clear oversight and security standards. These regulations require businesses to justify the necessity of facial recognition, prohibit its use in sensitive locations, and mandate transparency in data collection and storage.
Sources: [1]
How do the new regulations impact businesses using facial recognition technology in China?
The new regulations require businesses handling large-scale biometric data to register with authorities and comply with strict security measures, including encryption and limited retention periods. This aims to balance technological innovation with data security and privacy protection.
Sources: [1]

24 March, 2025
TechNode

An unhandled error has occurred. Reload 🗙