#registration--compliance

[ follow ]
fromNature
1 day ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#ai
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromwww.theguardian.com
6 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromwww.theguardian.com
6 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Digital life
fromwww.dw.com
12 hours ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Privacy professionals
fromKqed
3 hours ago

What Is the Point of California's Privacy Laws if Big Tech Ignores Them? | KQED

Google's non-compliance with the Global Privacy Control opt-out signal is evident in network traffic.
#ai-governance
#data-breach
EU data protection
fromSecurityWeek
12 hours ago

Europe's Largest Gym Chain Says Data Breach Impacts 1 Million Members

Basic-Fit experienced a data breach affecting personal information of approximately 1 million members across several European countries.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
EU data protection
fromTNW | Data-Security
1 day ago

Basic-Fit hit by hack affecting members across multiple countries, including 200,000 in the Netherlands

Basic-Fit experienced a data breach affecting 200,000 members, exposing personal and bank details but not passwords or identity documents.
EU data protection
fromSecurityWeek
5 days ago

300,000 People Impacted by Eurail Data Breach

Eurail is notifying over 300,000 customers about a data breach that exposed personal information, including names and passport numbers.
EU data protection
fromSecurityWeek
12 hours ago

Europe's Largest Gym Chain Says Data Breach Impacts 1 Million Members

Basic-Fit experienced a data breach affecting personal information of approximately 1 million members across several European countries.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
EU data protection
fromTNW | Data-Security
1 day ago

Basic-Fit hit by hack affecting members across multiple countries, including 200,000 in the Netherlands

Basic-Fit experienced a data breach affecting 200,000 members, exposing personal and bank details but not passwords or identity documents.
EU data protection
fromSecurityWeek
5 days ago

300,000 People Impacted by Eurail Data Breach

Eurail is notifying over 300,000 customers about a data breach that exposed personal information, including names and passport numbers.
Healthcare
fromMedCity News
2 days ago

Inside The DOJ's Hospital Contracting Crackdown: What Message Are the Feds Sending? - MedCity News

The Department of Justice is suing OhioHealth and NewYork-Presbyterian for anticompetitive contracting practices that limit patient access to affordable care.
#digital-sovereignty
fromFortune
5 days ago
DevOps

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Europe politics
fromTheregister
1 day ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
5 days ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Marketing tech
fromAcast
5 days ago

AI Governance Isn't a Barrier: It's Marketing's Growth Engine | Adspeak

AI is transforming marketing by enabling innovation through governance, clean data, and balancing automation with human creativity.
Privacy technologies
fromHer Campus
1 day ago

Why Website Cookies Aren't As Sweet As They Sound

Website cookies can raise serious privacy concerns due to their role in tracking user behavior and collecting personal data.
Law
fromIndependent
4 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
Privacy professionals
from404 Media
11 hours ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
Marketing tech
fromMarTech
1 day ago

A framework for auditing generative AI outputs pre-launch | MarTech

Marketing teams should use a four-stage audit framework for Generative AI outputs to ensure brand voice consistency and copyright compliance.
#social-media
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
#data-security
Law
fromAbove the Law
4 days ago

What The Legal Industry Can Learn About AI Hallucinations From Auditors - Above the Law

AI-generated legal documents can contain convincing errors, necessitating stronger governance and review processes in law firms.
fromTheregister
1 day ago

Gym giant Basic-Fit breached with at least 1M affected

Basic-Fit has confirmed that around 200,000 members in the Netherlands had their data stolen in a recent cyberattack, with a total of about one million affected across six countries.
EU data protection
#cybersecurity
Artificial intelligence
fromwww.theguardian.com
4 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Privacy professionals
fromSecurityWeek
15 hours ago

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings reported a cybersecurity incident exposing sensitive personal information of independent contractors due to an IDOR vulnerability.
Healthcare
fromSecuritymagazine
1 week ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Healthcare
fromSecurityWeek
2 weeks ago

Healthcare IT Platform CareCloud Probing Potential Data Breach

CareCloud experienced a cybersecurity incident that may have compromised patient information, but the impact is believed to be limited and manageable.
EU data protection
fromEngadget
2 weeks ago

European Commission confirms data breach

The European Commission experienced a cyber attack, resulting in the theft of over 350GB of data from its cloud infrastructure.
Artificial intelligence
fromwww.theguardian.com
4 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Privacy professionals
fromSecurityWeek
15 hours ago

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings reported a cybersecurity incident exposing sensitive personal information of independent contractors due to an IDOR vulnerability.
Healthcare
fromSecuritymagazine
1 week ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Healthcare
fromSecurityWeek
2 weeks ago

Healthcare IT Platform CareCloud Probing Potential Data Breach

CareCloud experienced a cybersecurity incident that may have compromised patient information, but the impact is believed to be limited and manageable.
EU data protection
fromEngadget
2 weeks ago

European Commission confirms data breach

The European Commission experienced a cyber attack, resulting in the theft of over 350GB of data from its cloud infrastructure.
fromArs Technica
4 days ago

Californians sue over AI tool that records doctor visits

The proposed class-action lawsuit states that the plaintiffs received medical care at various Sutter and MemorialCare facilities, where medical staff used Abridge AI to record conversations.
Healthcare
Privacy professionals
fromThe Verge
6 hours ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
#linkedin
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Privacy professionals
fromComputerworld
5 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Privacy professionals
fromComputerworld
5 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Information security
fromTechRepublic
6 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
EU data protection
fromTNW | Offers
2 weeks ago

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
Marketing tech
fromAdExchanger
1 month ago

The Privacy 'Zealots' Were Right: Ad Tech's Infrastructure Was Always A Risk

Digital advertising's granular targeting infrastructure created uncontrollable security vulnerabilities that governments now exploit for surveillance purposes.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Privacy professionals
fromAdExchanger
1 week ago

What Regulators Talk About When They Talk About Ad Tech | AdExchanger

Privacy regulators emphasize protecting children, honoring opt-outs, and ensuring companies are transparent about data collection practices.
Marketing
fromCMSWire.com
2 months ago

The Cookie Banner Checklist That Actually Matters

A centralized resource delivers actionable research, editorial insight and practical data to guide CMOs and customer experience leaders through complex customer and organizational landscapes.
Public health
fromMedium
2 months ago

Things AI Engineers Need to Keep in Mind with HIPAA and Healthcare Compliance

Healthcare AI requires system-level HIPAA compliance: data minimization, defensible de-identification, vendor BAAs, auditability, and proactive breach planning.
fromExchangewire
2 months ago

Axeptio Launches Global Privacy Control (GPC) Support to Strengthen Compliance with US Privacy Regulations

Global Privacy Control is a browser-level signal that allows users to express-prior to any interaction with a website-their decision to opt out of the sale or sharing of their personal data. To meet these evolving legal requirements, Axeptio now integrates GPC signal detection and processing through a new feature available for projects using a CCPA banner, a prerequisite for remaining compliant in the United States.
Privacy technologies
Information security
fromThe Hacker News
4 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromDataBreaches.Net
2 months ago

OCR's Latest HIPAA Guidance and Common HIPAA Pitfalls - DataBreaches.Net

As Theresa Defino recently reported, HHS OCR will prioritize risk assessments and expand its investigations into risk management in 2026. Alisa Chestler and Layna Cook Rush of Baker Donelson have summarized some recent recommendations from HHS OCR's January 2026 Cybersecurity Newsletter that regulated entities may want to pay increased attention to at this point: Patching Is a Required Risk Management Activity Legacy Systems and Unpatchable Vulnerabilities Are Not Excuses Unnecessary Software and Default Accounts Create Hidden Risk
Healthcare
Privacy professionals
fromTheregister
4 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Healthcare
fromSecuritymagazine
1 month ago

Top 20 Healthcare Data Breaches of 2025

Healthcare data breaches fell 4.3% in 2025, but reporting delays and late additions—compounded by a federal shutdown—may obscure the final breach total.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Information security
fromBusiness Matters
1 month ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
EU data protection
fromDataBreaches.Net
1 month ago

Resource: Privacy Law Directory -- Codamail - DataBreaches.Net

Privacy laws primarily protect domestic citizens while intelligence exemptions and international intelligence-sharing alliances enable extensive cross-border surveillance and data flows.
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Information security
fromTechzine Global
2 months ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
fromThe Hacker News
2 months ago

The Hidden Risk of Orphan Accounts

Traditional IAM and IGA systems are designed primarily for human users and depend on manual onboarding and integration for each application - connectors, schema mapping, entitlement catalogs, and role modeling. Many applications never make it that far. Meanwhile, non-human identities (NHIs): service accounts, bots, APIs, and agent-AI processes are natively ungoverned, operating outside standard IAM frameworks and often without ownership, visibility, or lifecycle controls.
Information security
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
Information security
fromSecuritymagazine
2 months ago

7 Data Breaches, Exposures to Know About (January 2026)

2025 recorded the most breaches while victim notices fell 79%, indicating attackers shifted from mega‑breaches to more frequent, targeted attacks on high‑value data.
Privacy professionals
fromExchangewire
1 month ago

EscalaX Reinforces its Privacy & Compliance With BidSafe One

EscalaX partners with BidSafe One to strengthen privacy, consent management, and regulatory compliance across programmatic advertising, ensuring secure multichannel data governance.
fromeLearning Industry
2 months ago

Why Data Privacy Is Mission-Critical In Corporate eLearning

There's been an explosion in the growth of corporate eLearning initiatives in the post-COVID era. That's due in part to the growth in remote work and geographically distributed teams. Unfortunately, there are always growing pains when any corporate initiative scales up in a hurry. In the case of eLearning, one of those growing pains is a tendency to let data privacy standards fall by the wayside.
Privacy professionals
fromThe Cyber Express
2 months ago

Data Privacy Week 2026 Interview: Why Verification Matters

Ad fraud isn't just a marketing problem anymore - it's a full-scale threat to the trust that powers the digital economy. In 2024 alone, fraud in mobile advertising jumped 21%, while programmatic ad fraud drained nearly $50 billion from the industry. During data privacy week 2026, these numbers serve as a reminder that ad fraud is not only about wasted budgets - it's also about how consumer data moves, gets tracked, and sometimes misused across complex ecosystems.
Privacy professionals
fromAdExchanger
2 months ago

Inside The Mind Of A Former Privacy Regulator | AdExchanger

How do privacy regulators decide which companies to poke? Often, it's a consumer complaint. Other times, it's a headline. And, sometimes, it's just personal. Regulators are consumers, too, after all. But it's important to remember that every brush with a regulator doesn't turn into a full-blown case, said privacy attorney Tyler Bridegan. Bridegan spent nearly two years as director of privacy and tech enforcement for the Texas attorney general's office. He left government work and returned to private practice in October as a partner at Womble Bond Dickinson.
Privacy professionals
[ Load more ]