#cloud-compliance

[ follow ]
Privacy professionals
fromSecuritymagazine
9 hours ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
#cybersecurity
Information security
fromThe Hacker News
1 day ago

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

CISA added eight new vulnerabilities to its KEV catalog, including critical flaws in Cisco Catalyst SD-WAN Manager, indicating active exploitation.
DevOps
fromSecuritymagazine
9 hours ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
France news
fromThe Local France
18 hours ago

Warning over cyber-attack on French government's ANTS platform

Hackers accessed personal details of users on the French government's ANTS platform, prompting warnings about potential phishing scams.
Careers
fromSecuritymagazine
2 days ago

Advance Your Cybersecurity Career

Degrees and certifications in cybersecurity indicate foundational knowledge but hands-on experience and skills are more critical for success.
Information security
fromComputerWeekly.com
17 hours ago

M&S one year on: turning anticipation into secure by design | Computer Weekly

Retailers must prioritize preparedness for cyber attacks, focusing on third-party risk and continuous visibility across their supply chains.
Information security
fromThe Hacker News
1 day ago

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

CISA added eight new vulnerabilities to its KEV catalog, including critical flaws in Cisco Catalyst SD-WAN Manager, indicating active exploitation.
#data-centers
EU data protection
fromTechzine Global
19 minutes ago

New EU rules stall due to lack of data center data

Europe's data center sustainability regulations reveal significant gaps in data quality and reporting, hindering accurate assessments of energy consumption and environmental impact.
Environment
fromwww.dw.com
23 hours ago

Why the cloud still runs on coal and gas

Data centers in the U.S. are straining energy grids, leading to increased reliance on fossil fuels and delaying renewable energy goals.
Environment
fromwww.dw.com
23 hours ago

Why cloud computing still runs on coal and gas

Data centers' energy demands are straining U.S. power grids, leading to reliance on fossil fuels and delaying renewable energy goals.
EU data protection
fromTechzine Global
19 minutes ago

New EU rules stall due to lack of data center data

Europe's data center sustainability regulations reveal significant gaps in data quality and reporting, hindering accurate assessments of energy consumption and environmental impact.
Environment
fromwww.dw.com
23 hours ago

Why the cloud still runs on coal and gas

Data centers in the U.S. are straining energy grids, leading to increased reliance on fossil fuels and delaying renewable energy goals.
Environment
fromwww.dw.com
23 hours ago

Why cloud computing still runs on coal and gas

Data centers' energy demands are straining U.S. power grids, leading to reliance on fossil fuels and delaying renewable energy goals.
Data science
fromInfoWorld
23 hours ago

Addressing the challenges of unstructured data governance for AI

Enterprises must enhance data governance for unstructured data as AI transforms data management practices.
#ai
Artificial intelligence
fromwww.cbc.ca
16 hours ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Information security
fromTechzine Global
1 week ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromwww.cbc.ca
16 hours ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Information security
fromTechzine Global
1 week ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
#cloud-computing
European startups
fromTechzine Global
22 hours ago

The European cloud of the future is built using actual, physical containers

Cloud workloads increasingly utilize physical containers through initiatives like the Modular Integrated Sustainable Datacenter (MISD) project.
DevOps
fromInfoWorld
4 days ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
European startups
fromTechzine Global
22 hours ago

The European cloud of the future is built using actual, physical containers

Cloud workloads increasingly utilize physical containers through initiatives like the Modular Integrated Sustainable Datacenter (MISD) project.
DevOps
fromInfoWorld
4 days ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
Apple
fromTechCrunch
13 hours ago

Apple's Cal AI crackdown signals it's still policing the App Store | TechCrunch

Apple enforces strict App Store rules, recently removing Cal AI for violating in-app purchase guidelines and using manipulative tactics.
#microsoft
Marketing tech
fromAxios
17 hours ago

Microsoft wants to build the infrastructure behind the AI internet

Microsoft is creating a two-sided marketplace to compensate publishers for content used by AI products, ensuring fair use and collaboration.
Tech industry
fromComputerworld
1 hour ago

Microsoft trims cloud desktop pricing, even as it boosts AI costs

Microsoft is reducing prices for Windows 365 and AVD while increasing Microsoft 365 costs, aiming to promote cloud-based PCs and AI services.
Marketing tech
fromAxios
17 hours ago

Microsoft wants to build the infrastructure behind the AI internet

Microsoft is creating a two-sided marketplace to compensate publishers for content used by AI products, ensuring fair use and collaboration.
Privacy technologies
fromThe Verge
6 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Tech industry
fromComputerworld
1 hour ago

Microsoft trims cloud desktop pricing, even as it boosts AI costs

Microsoft is reducing prices for Windows 365 and AVD while increasing Microsoft 365 costs, aiming to promote cloud-based PCs and AI services.
#data-breach
Healthcare
fromSecurityWeek
22 hours ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Three US healthcare organizations reported data breaches affecting nearly 600,000 individuals, with significant incidents in Texas and Illinois.
Privacy professionals
fromTheregister
1 day ago

Lovable denies data leak, cites 'intentional behavior'

Lovable's platform has a significant security flaw allowing free accounts to access sensitive user information, raising concerns about data protection.
Privacy professionals
fromTechRepublic
1 day ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
Information security
fromTheregister
5 days ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Healthcare
fromSecurityWeek
22 hours ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Three US healthcare organizations reported data breaches affecting nearly 600,000 individuals, with significant incidents in Texas and Illinois.
Privacy professionals
fromTheregister
1 day ago

Lovable denies data leak, cites 'intentional behavior'

Lovable's platform has a significant security flaw allowing free accounts to access sensitive user information, raising concerns about data protection.
Privacy professionals
fromTechRepublic
1 day ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
Information security
fromTheregister
5 days ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Intellectual property law
fromAdExchanger
2 days ago

Why A 1967 Privacy Law Is Powering A New Wave Of Ad Tech Lawsuits | AdExchanger

CIPA, a 1967 law, has become a significant challenge for ad tech due to its private right of action and potential for high damages.
DevOps
fromInfoQ
9 hours ago

Cloudflare Outlines MCP Architecture as Enterprises Confront Security and Governance Risks

Centralized governance and remote infrastructure are essential for secure Model Context Protocol deployments, addressing risks like prompt injection and supply chain attacks.
Information security
fromSecurityWeek
24 minutes ago

Oracle Patches 450 Vulnerabilities With April 2026 CPU

Oracle released 481 new security patches in April 2026, addressing vulnerabilities across 28 product families, with many remotely exploitable without authentication.
#data-privacy
EU data protection
fromThedrum
1 day ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
fromAdExchanger
4 hours ago
Privacy professionals

Think You're Not A Data Broker? California's Delete Act Might Say Otherwise | AdExchanger

EU data protection
fromThedrum
1 day ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromwww.theguardian.com
5 hours ago

Rental platform unnecessarily collected the data of millions of Australians, privacy commissioner finds

Excessive data collection by rental platforms increases tenant vulnerability, prompting calls for reduced personal information requirements.
Privacy professionals
fromAdExchanger
4 hours ago

Think You're Not A Data Broker? California's Delete Act Might Say Otherwise | AdExchanger

California's data broker registration requirements mandate businesses to register and comply with consumer data deletion requests or face significant penalties.
Artificial intelligence
fromFortune
14 hours ago

Google Cloud's next big moment-and what it needs to continue its ascent | Fortune

Google's AI advancements are revitalizing its cloud division, with significant revenue growth and a focus on addressing bottlenecks in AI implementation.
#cloud-sovereignty
European startups
fromTheregister
1 day ago

Europe picks 4 sovereign cloud providers, but one has Google

The European Commission awarded contracts for cloud services, raising concerns about true independence due to involvement of S3NS, a Thales and Google Cloud joint venture.
European startups
fromTheregister
1 day ago

Europe picks 4 sovereign cloud providers, but one has Google

The European Commission awarded contracts for cloud services, raising concerns about true independence due to involvement of S3NS, a Thales and Google Cloud joint venture.
DevOps
fromwww.bankingdive.com
2 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
EU data protection
fromTechRepublic
1 day ago

EU to Classify ChatGPT as VLOSE Under Digital Services Act

ChatGPT may be classified as a 'Very Large Online Search Engine' under the Digital Services Act, imposing stricter compliance on OpenAI.
#ai-security
fromTechRepublic
1 day ago
Artificial intelligence

The MCP Disclosure Is the AI Era's 'Open Redirect' Moment

The Model Context Protocol has a design flaw that enables AI supply chain attacks, posing a significant security risk to enterprise AI systems.
Artificial intelligence
fromTechRepublic
1 day ago

The MCP Disclosure Is the AI Era's 'Open Redirect' Moment

The Model Context Protocol has a design flaw that enables AI supply chain attacks, posing a significant security risk to enterprise AI systems.
European startups
fromTechzine Global
1 day ago

Cisco Sovereign Critical Infrastructure now available in Europe

Cisco launches Sovereign Critical Infrastructure across EMEA, enabling organizations to innovate while maintaining control over their data and infrastructure.
#digital-sovereignty
DevOps
fromTechzine Global
2 hours ago

Red Hat OpenShift takes sovereign step to Google Cloud Dedicated

Red Hat OpenShift on Google Cloud Dedicated supports regulated sectors with isolated infrastructure for digital sovereignty, available in the second half of 2026.
DevOps
fromTechzine Global
2 hours ago

Red Hat OpenShift takes sovereign step to Google Cloud Dedicated

Red Hat OpenShift on Google Cloud Dedicated supports regulated sectors with isolated infrastructure for digital sovereignty, available in the second half of 2026.
EU data protection
fromComputerWeekly.com
5 days ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
European startups
fromTNW | Eu
4 days ago

EU awards its 180 million sovereign cloud contract

The European Commission awarded a €180 million sovereign cloud contract to four provider groups, emphasizing diversification and resilience in cloud services.
DevOps
fromComputerWeekly.com
2 days ago

Storage implications of a modern IT architecture | Computer Weekly

Organizations are increasingly using containers to modernize applications and manage both cloud-native and traditional workloads with Kubernetes.
Artificial intelligence
fromInfoWorld
19 hours ago

Snowflake offers help to users and builders of AI agents

Snowflake enhances its Intelligence and Cortex Code for better automation and data source access, aiming for a unified enterprise AI experience.
Artificial intelligence
fromTearsheet
21 hours ago

Why the back office comes first in AI deployments and failures that keep reappearing - Tearsheet

67% of banks and credit unions are implementing AI, but only 16% have a coherent strategy for it.
DevOps
fromMedium
1 day ago

The AI Infrastructure Stack in 2026: Companies Building the Future of AI

AI infrastructure companies are transforming the deployment and scaling of artificial intelligence into full production systems with essential governance and observability.
Artificial intelligence
fromTechRepublic
4 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#aws
DevOps
fromInfoQ
5 days ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
DevOps
fromTheregister
1 week ago

AWS: Agents shouldn't be secret, so we built a registry

AWS Agent Registry enhances visibility and control over AI agents in corporate environments.
DevOps
fromMedium
2 weeks ago

AWS Security and Compliance Quiz (25 Questions) with Detailed Answers - Cloud Practitioner Guide

Understanding AWS security services is essential for modern applications running on AWS.
DevOps
fromInfoQ
5 days ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
DevOps
fromTheregister
1 week ago

AWS: Agents shouldn't be secret, so we built a registry

AWS Agent Registry enhances visibility and control over AI agents in corporate environments.
DevOps
fromMedium
2 weeks ago

AWS Security and Compliance Quiz (25 Questions) with Detailed Answers - Cloud Practitioner Guide

Understanding AWS security services is essential for modern applications running on AWS.
fromTheregister
4 days ago

Atlassian to train AI on user data unless law or cash say no

Atlassian will seek to collect two types of data from its 300,000 global customers: metadata and in-app data from Jira, Confluence, and its other cloud products, which will then be fed into the company's models.
Privacy professionals
#vercel
Information security
fromTechCrunch
1 day ago

App host Vercel confirms security incident, says customer data was stolen via breach at Context AI | TechCrunch

Vercel experienced a data breach due to a compromised employee account linked to Context AI, exposing customer credentials.
Information security
fromSiliconANGLE
1 day ago

Developer tooling provider Vercel discloses breach that exposed some users' data - SiliconANGLE

Vercel experienced a security breach through Context.ai, compromising limited customer data and employee information.
Information security
fromTechRepublic
1 day ago

Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand

Vercel confirmed a security incident involving unauthorized access to internal systems, with a threat actor claiming to sell stolen company data.
Information security
fromTechCrunch
1 day ago

App host Vercel confirms security incident, says customer data was stolen via breach at Context AI | TechCrunch

Vercel experienced a data breach due to a compromised employee account linked to Context AI, exposing customer credentials.
Information security
fromSiliconANGLE
1 day ago

Developer tooling provider Vercel discloses breach that exposed some users' data - SiliconANGLE

Vercel experienced a security breach through Context.ai, compromising limited customer data and employee information.
Information security
fromTechRepublic
1 day ago

Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand

Vercel confirmed a security incident involving unauthorized access to internal systems, with a threat actor claiming to sell stolen company data.
DevOps
from24/7 Wall St.
5 days ago

Oracle's New AWS Partnership Just Put It Ahead of Azure and Google Cloud

Multicloud setups are essential for enterprise AI, enabling seamless data movement and integration across different cloud providers.
Information security
fromSecuritymagazine
2 days ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
Information security
fromSecurityWeek
21 hours ago

Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with eight new flaws, including high-severity bugs in Cisco and Kentico products.
Information security
fromTheregister
1 day ago

Adaptavist Group breach: Ransomware crew claims mega-haul

Adaptavist Group is investigating a security breach involving stolen credentials, while a ransomware group claims to have accessed extensive data.
Information security
fromHarvard Gazette
4 days ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Information security
fromComputerWeekly.com
5 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
fromComputerWeekly.com
1 month ago

Weighing up the enterprise risks of neocloud providers | Computer Weekly

Neocloud providers, which include the likes of Nscale, CoreWeave and Carbon3.ai, are having a somewhat disruptive impact on the market by making huge commitments to build out hyperscale datacentres in support of the UK government's AI growth agenda. These providers are also taking up capacity in colocation datacentres that some of the hyperscale cloud giants previously committed to renting space in, before pulling out.
Miscellaneous
Information security
fromTechRepublic
5 days ago

McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked

Unauthorized access to limited internal data at McGraw-Hill was linked to a Salesforce misconfiguration, raising concerns about potential identity fraud and harassment.
fromMedium
1 month ago

Mastering Azure Governance: Why It Matters and How to Get Started

Azure Governance is the set of policies, processes, and technical controls that ensure your Azure environment is secure, compliant, and well-managed. It provides a structured approach to organizing subscriptions, resources, and management groups, while defining standards for naming, tagging, security, and operational practices.
DevOps
European startups
fromComputerWeekly.com
1 month ago

Regulate AWS and Microsoft, says UK cloud provider survey | Computer Weekly

71% of cloud providers urgently demand UK regulatory intervention to prevent Microsoft and AWS from creating insurmountable competitive barriers in the highly concentrated cloud market.
fromSecuritymagazine
2 weeks ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
fromDbmaestro
5 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Information security
fromSecurityWeek
1 month ago

Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches

All analyzed companies operate AI-enabled SaaS environments, with organizations averaging 140 such applications, creating cascading breach risks across interconnected systems.
Information security
fromTheregister
3 months ago

AI framework flaws put enterprise clouds at risk of takeover

Two Chainlit vulnerabilities enable arbitrary file reads and SSRF attacks, risking exposure of environment variables, credentials, and potential cloud takeover if not patched.
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
Information security
fromBusiness Matters
1 month ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
[ Load more ]