Skip to navigation

DataBreachToday.eu

spacer
  • USA
  • UK
  • Europe
  • India
  • Asia
  • Sign In
  • Subscribe
  • Home
  • Legislation

Legislation

The Latest News

  • Article

    UK Elections: Privacy, Security Impacts

    As Tories Take Majority, Experts Detail Expected Policies By Mathew J. Schwartz
    spacer

    Britain's Tory party has secured a majority in Parliament, which means the country will soon see a new legislative agenda. Here are some of the information security, privacy and surveillance initiatives to expect in the coming months.

  • Article

    The Implications of Court's NSA Ruling

    Assessing Order Declaring NSA Bulk Collection Program Illegal By Eric Chabrow
    spacer

    A federal appellate court decision that the National Security Agency's bulk data collection program is illegal could have sweeping ramifications beyond derailing the initiative to amass the metadata of Americans' telephone calls.

  • Blog

    Updating Global Cyber Law Enforcement

    Treaty Revisions Needed to Keep Pace with Technology By Paul Rosenzweig
    spacer

    Updating the slow-moving Mutual Legal Assistance Treaty process is critical to bringing cyber law enforcement into the 21st century. That's why Congress needs to take prompt action.

  • Article

    Surveillance Report Urges Transparency

    Calls for Rewriting UK Intelligence Law from Scratch By Mathew J. Schwartz
    spacer

    Parliament's Intelligence and Security Committee has called for a reboot of the regulations that govern Britain's intelligence services, warning that the current approach "is unnecessarily complicated and - crucially - lacks transparency."

  • Blog

    EU Privacy Overhaul: Still Waiting

    Why Europe Can't Get New Privacy Legislation Passed By Mathew Schwartz
    spacer

    Europe's vaunted data protection regulations - now 20 years old - are in desperate need of an update. In 2012, EU officials proposed extensive changes to the privacy rules, but they remain stuck in limbo. Here's why.

More news...

White Papers

  • Governing User Access: Why Provisioning-Centric Approaches Fall Short

    spacer

    Organizations of all sizes continue to face ever-stricter regulatory and security requirements to protect their IT assets from unauthorized use. In response, many enterprises have embarked upon...

  • Proofpoint Report on Outbound Email Security and Data Loss Prevention

    spacer

    How concerned are companies about the content of email leaving their organizations? And how do companies manage the legal and financial risks associated with outbound email? To find out, Proofpoint...

Webinars

  • Healthcare Information Security Today: 2015 Survey Results and Analysis

    What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? Join us for this webinar that will provide answers.

  • Security Alerts: Identifying Noise vs. Signals

    For anyone working in a security operations center, this is a familiar picture: lots of alerts, but not enough analysts; too many disparate tools to manage effectively; not enough visibility, and too...

More webinars...
ARTICLE Anthem Breach: Chinese Hackers Involved?

As health insurer Anthem's breach investigation progresses, some news reports are already pointing...

Latest Tweets and Mentions

ARTICLE Anthem Breach: Chinese Hackers Involved?

As health insurer Anthem's breach investigation progresses, some news reports are already pointing...

The ISMG Network

  • spacer
    Webinar

    I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response

  • spacer
    Article

    Bill Altering Privacy Rule Advances

    Legislation Is Designed to Boost Medical Research, Innovation

  • spacer
    Article

    Sally Beauty Confirms Second Breach

    Retailer's Investigation of 'Illegal Intrusion' Continues

  • spacer
    Interview

    Art Coviello: Venture Capitalist

    Ex-RSA Chairman Joins Rally Ventures as Partner

  • spacer
    Article

    House Votes to Ban NSA Bulk Collection

    USA Freedom Act Passes by Wide Margin

  • spacer
    Article

    FTC's LabMD Case: The Next Steps

    Commission Won't Call Rebuttal Witness

  • spacer
    Article

    The Challenges of Securing Smart Cities

    Middle Eastern, Asian Leaders Align with Security Frameworks

  • spacer
    Interview

    Qatar Builds on Information Assurance

    QCERT's Ismael on How IA Helps CISOs Manage Risks

  • spacer
    Blog

    Government Critic Gets White House Role

    Princeton Professor Ed Felten Is New Federal Deputy CTO

  • spacer
    Interview

    Saudi Banks: Lessons from Attacks

    Banque Saudi Fransi's Osman on Responding to Top Threats

prev next