Proposed cyber security requirements for New York State seem to be more of the same

Read why Steven Grossman says that the proposed cyber security requirements for New York State seem to be more of the same on Help Net Security : This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by the NY State Department of Financial Services […]

Calls for Federal Breach Notification Law Continue After Yahoo Data Breach

Data breach prevention and response are again at the forefront of the public consciousness with the recent news of a massive data breach by Yahoo. The call for federal breach notification legislation was revived by the FTC on September 27, 2016, five days after the Yahoo breach was announced. Read how the clamor for data […]

Yahoo hack spurs push for legislation

Supporters of legislation that would dictate how and when companies have to notify customers of a data breach are seizing on the hack of 500 million Yahoo accounts to push their effort forward. “We haven’t hit that sweet spot quite yet, but we’re close. I’m hoping this revelation about Yahoo will provide the needed impetus to […]

Small-business cybersecurity bill clears House

A bill to increase federal assistance to help small businesses protect against digital threats passed the House on Wednesday. The Improving Small Business Cyber Security Act calls for the Small Business Administration and the Department of Homeland Security to develop a strategy to aid small businesses that will leverage existing small-business development centers. Read the news […]

Retailers battle financial sector over data breach legislation

Retailers on Tuesday doubled down on their opposition to a data breach notification bill favored by financial firms. The Retail Industry Leaders Association (RILA), one of the sector’s largest trade groups, argued in a letter to House leadership that the measure would be unfair to large swaths of the economy. Read how the retail industry […]

How To Prepare Your Organisation For EU Data Protection Reform

Whether you are part of a European company or a non-European company that trades or stores data inside Europe, it is likely that the new European data protection regulations coming into play will affect the way you handle employee and customer data. Read Mark Edge of Brainloop explain how businesses can prepare themselves for the full […]

5 key takeaways from Cybersecurity Act of 2015

Read the five key takeaways from the cyber security Act 2015 according to Jessica Davis on Healthcare IT News : When President Barack Obama signed The Cybersecurity Act of 2015, which was included in the federal omnibus government spending package, the legislation included nine pages of healthcare-related cybersecurity measures. While these definitions lay out the […]

Industry pros, tech firms displeased with cyber bill

The U.S. House approved controversial cybersecurity legislation buried within a $1.1 trillion government spending agreement that was needed to prevent a government shutdown. Legislators had been working for months to finalize language contained in the compromise text merged from three separate bills. If President Obama signs the spending deal as is expected, companies will face corporate […]

Data breach up next

House-Senate talks continued over the weekend on finalizing a cybersecurity information sharing bill. “Good progress made today at the staff level,” one aide said Friday. Text could be circulated as soon as today, another aide said. But one of the key sticking points remains, MC hears, namely Section 407 of the Senate-passed bill — a […]

Hacked Opinions: The legalities of hacking – Joseph Pizzo

Hacked Opinions is an ongoing series of Q&As with industry leaders and experts on a number of topics that impact the security community. The first set of discussions focused on disclosure and how pending regulation could impact it. This week CSO is posting the final submissions for the second set of discussions examining security research, […]