Laws, Policy, Regulations

DHS piloting agile cyber acquisition, CDM for cloud, CISO says

DHS piloting agile cyber acquisition, CDM for cloud, CISO says

GCHQ Collects Mass Social Media Data on Millions in UK—Report

GCHQ Collects Mass Social Media Data on Millions in UK—Report

Pentagon chief asks Congress to not hinder cyber defence

Pentagon chief asks Congress to not hinder cyber defence

U.S. Proposes New Cyber Security Controls to Protect Power Grid

U.S. Proposes New Cyber Security Controls to Protect Power Grid

There’s No Good Decision in the Next Big Data Privacy Case

There’s No Good Decision in the Next Big Data Privacy Case

Europol cops lean on phone networks, ISPs to dump CGNAT walls that 'hide' cyber-crooks

Europol cops lean on phone networks, ISPs to dump CGNAT walls that 'hide' cyber-crooks

UK's New ‘Internet Safety Strategy’ Cracks Down on Online Danger

UK's New ‘Internet Safety Strategy’ Cracks Down on Online Danger

Attack of the Hack Back

Attack of the Hack Back

Senators bear down on credit reporting industry over data security

Senators bear down on credit reporting industry over data security

Online shoppers could be forced to enter a code before making a purchase under plans to curb fraud

Online shoppers could be forced to enter a code before making a purchase under plans to curb fraud

DoD CIO sets baseline for mobile app security

DoD CIO sets baseline for mobile app security

Decrypting the Going Dark Debate

Decrypting the Going Dark Debate

NIST Cybersecurity Framework not just for large organizations

NIST Cybersecurity Framework not just for large organizations

Would the United States Be Responsible for Private Hacking?

Would the United States Be Responsible for Private Hacking?

Iran Regime Unveils New Comprehensive Legal System for Internet

Iran Regime Unveils New Comprehensive Legal System for Internet

India: Government may levy a security cess on all digital transactions

India: Government may levy a security cess on all digital transactions

Get the latest updates on the cyber laws, policies and regulations

The increasing use of cyberspace for personal and official work by the citizens has necessitated new laws for governing the cyberspace. Data privacy laws and data protection laws have assumed utmost importance. Whenever a new data protection regulation or a new data protection law is passed by the government, it is meticulously debated and discussed by the experts and non-experts alike because it affects everyone. It is essential to note that laws and regulations reflect the policy of the government. This category provides expertly curated cyber security news on all the laws, policy and regulations related to cyberspace and the different types of security policies adopted by the government and the corporate sector alike. These include but are not restricted to IT security policy, network security policy, data security policy, data protection policy and information system security policy.