Navigate the new European AI Act and possible global standardization

Navigate the new European AI Act and possible global standardization

No doubt, the European Union’s (EU) recently approved, comprehensive regulation act on artificial intelligence (AI) is an important milestone in the global effort to establish responsible AI governance. This landmark legislation establishes a robust legal structure, setting stringent standards for AI development and usage within the EU, with the aim of nurturing a climate where businesses and investors can innovate with confidence, knowing their AI systems must adhere to principles of safety, transparency, equity and…

Read More

Proposed rules may lead to increased compliance requirements ahead

Proposed rules may lead to increased compliance requirements ahead

On January 29, 2024, the U.S. Department of Commerce’s (DOC) Bureau of Industry and Security (BIS) issued a proposed rule seeking to secure U.S. Infrastructure as a Service (IaaS) products against foreign parties seeking to use such products to engage in malicious cyber-enabled activity. Specifically, the proposed rule would impose certain due diligence and reporting requirements on U.S. IaaS providers and their foreign resellers. The Notice of Proposed Rule Making (NPRM) follows Executive Order 13984…

Read More

Privacy is a Key Enabler of Trust

Privacy is a Key Enabler of Trust

How important is privacy in building and maintaining trust with customers? While more than 160 countries have omnibus privacy laws today, business leaders recognize that privacy is more than a compliance exercise – it has become a business imperative that is inextricably tied to customer trust.  As part of Cisco’s recognition of Data Privacy Day on January 28, today we released the Cisco 2024 Data Privacy Benchmark Study, our seventh annual review of key privacy issues…

Read More

Pervasive Ransomware Visibility on Existing Infrastructure: How Cisco Secure Network Analytics Helps

Pervasive Ransomware Visibility on Existing Infrastructure: How Cisco Secure Network Analytics Helps

Cyber security attacks in 2023 reached a new level of sophistication as significant supply chain attacks and evolved malware tools have accelerated the risk facing financial institutions. With insider threat and supply chain risk presenting the weakest link in the chain, the threat facing financials is no longer if, but how they will be breached. And more importantly, how they can detect, contain, and defend against breaches as they occur. Tool sprawl has created an…

Read More

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

A manifesto for cloud data security

A manifesto for cloud data security

A manifesto for cloud data security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Achieving Cloud Compliance Throughout Your Migration

Achieving Cloud Compliance Throughout Your Migration

So, where do you start? Your first step should be identifying which security tool will best meet the needs of ever-changing compliance standards and will keep up with your evolving infrastructure. As we discussed in our last article, a security services platform is ideal. Here’s how it can help you with the four compliance challenges we mentioned earlier: Challenge #1: Data transfer ─ Localized protection Unlike point products, a platform can be deployed across multi-…

Read More
1 2 3 4 5 16