Laws, Policy, Regulations

NIST: In mobile authentication, think hardware, not software

NIST: In mobile authentication, think hardware, not software

Plex Updates Privacy Policy So Users Can't Opt out of Data Collection

Plex Updates Privacy Policy So Users Can't Opt out of Data Collection

China Opens its First 'Cyber Court'

China Opens its First 'Cyber Court'

Developments in New York and Colorado Cybersecurity Regulations

Developments in New York and Colorado Cybersecurity Regulations

Don’t be caught out by China’s new cybersecurity law

Don’t be caught out by China’s new cybersecurity law

Cyber CEOs urge NIST Framework be made a part of NAFTA talks

Cyber CEOs urge NIST Framework be made a part of NAFTA talks

The Empire State Lays Down the Marker on Cybersecurity

The Empire State Lays Down the Marker on Cybersecurity

Cambodia arrests nearly 400 from China and Taiwan over telecoms fraud

Cambodia arrests nearly 400 from China and Taiwan over telecoms fraud

No longer 'federal,' no longer exclusively 'cyber' — NIST security controls break out

No longer 'federal,' no longer exclusively 'cyber' — NIST security controls break out

Information security policies every business must implement

Information security policies every business must implement

Spain plans to fine large firms that fail to notify authorities of cyberattacks

Spain plans to fine large firms that fail to notify authorities of cyberattacks

Neo-Nazi site The Daily Stormer shifts base to the dark web

Neo-Nazi site The Daily Stormer shifts base to the dark web

NIST Releases Updated Cyber and Privacy Guidance Draft

NIST Releases Updated Cyber and Privacy Guidance Draft

10 Things to Know About the Network and Information Security Directive

10 Things to Know About the Network and Information Security Directive

Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks

Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks

Court rejects LinkedIn claim that unauthorized scraping is hacking

Court rejects LinkedIn claim that unauthorized scraping is hacking

Get the latest updates on the cyber laws, policies and regulations

The increasing use of cyberspace for personal and official work by the citizens has necessitated new laws for governing the cyberspace. Data privacy laws and data protection laws have assumed utmost importance. Whenever a new data protection regulation or a new data protection law is passed by the government, it is meticulously debated and discussed by the experts and non-experts alike because it affects everyone. It is essential to note that laws and regulations reflect the policy of the government. This category provides expertly curated cyber security news on all the laws, policy and regulations related to cyberspace and the different types of security policies adopted by the government and the corporate sector alike. These include but are not restricted to IT security policy, network security policy, data security policy, data protection policy and information system security policy.