The Week Ahead: House Homeland Security conducts field hearing on cyber innovation, plus a June events preview

The House Homeland Security Committee is gearing up for a pivotal field hearing in Silicon Valley this week, focusing on vital federal cybersecurity efforts and dialogues with stakeholders. Tech experts from NIST, CISA, and the Defence Department are also set to participate in a cyber conference hosted by Qualys. This field hearing at Stanford University’s […]

Read More →

Sens. Warner, Lankford reintroduce vulnerability disclosure bill to establish requirements for federal contractors

Senate Intelligence ranking member Mark Warner (D-VA) and Sen. James Lankford (R-OK) have reintroduced legislation aimed at enforcing vulnerability disclosure policies for federal contractors. This comes as a follow-up to a similar bill that successfully passed the House earlier in March. The sponsors emphasise that these policies are crucial for ensuring that federal contractors align […]

Read More →

The EU Cyber Resilience Act: Navigating the Digital Frontier with “The Good, The Bad, and The Ugly”

Summary The EU Cyber Resilience Act (CRA) represents a significant move towards enhancing cybersecurity across products with digital components in the European market. With this legislation, the EU sets a minimum standard for security in all kinds of devices, from smart home appliances to industrial controls. The CRA shifts the responsibility for identifying and addressing […]

Read More →

MITRE calls for ‘civil defense’ education to provide public training in event of cyber attack

A recent report from MITRE advocates for using “traditional civil defense” measures through education efforts to equip the public with the knowledge to prepare for cyber attacks. MITRE stresses the need for the United States to rethink its emergency preparedness, shifting focus from natural disasters to the multifaceted disruptions that cyber attacks can cause across […]

Read More →

Bridging the Gap: Integrating Legal and Insurance Considerations into Restaurant Cybersecurity Response

In today’s digital landscape, restaurants are prime targets for cybercriminals, with various entry points exploited, including point-of-sale systems and customer databases. As seen from recent breaches in well-known chains like Five Guys and Yum! Brands, many restaurant operators remain underprepared when integrating legal and insurance considerations into cybersecurity plans. This article emphasises the importance of […]

Read More →

Fintech firms ‘ramp up hiring to tackle compliance and cybersecurity challenges’

UK fintech firms are gearing up for a surge in recruitment, with professional hiring expected to jump by 32 percent. Despite lingering economic uncertainty and a cautious investment climate, companies are pressing ahead with growth plans, driven by mounting compliance demands and the need to bolster cybersecurity. The latest fintech report from Morgan McKinley and […]

Read More →

China Monthly Data Protection Update: May 2025

The latest report provides key updates in China’s data protection landscape for May. It highlights significant regulatory developments, penalties imposed for data breaches, and innovations in personal data management by tech companies. Key Points CAC completed 298 Cross-Border data security assessments; 15.9% were rejected. RedNote and Bilibili launched a feature to allow users to visualise […]

Read More →

New funding to accelerate UK-built cybersecurity chips

SCI Semiconductor has secured £2.5 million to advance its development of the world’s first commercially viable “memory safe” computer chip. The funding, led by Mercia Ventures, aims to tackle vulnerabilities in legacy systems that are often exploited in cyberattacks. Source: Business Link Magazine Key Points SCI Semiconductor receives £2.5 million for innovative cybersecurity chip development. […]

Read More →

AI on trial: Embarking on an AI POC

As organisations venture into the world of Artificial Intelligence (AI), many are considering a Proof of Concept (POC) to assess AI tools practically. This article dives into what an AI POC involves, including its potential legal and non-legal risks, offering insights for organisations looking to adopt AI responsibly. Source: Lexology Key Points An AI POC […]

Read More →

How well do you know your remote IT worker?

Recently, there’s been a rise in fake IT workers sneaking into companies, claiming to be remote employees and accessing sensitive data. This isn’t just a cybersecurity threat; it’s becoming a significant geopolitical issue, with links to North Korean schemes. As companies around the globe face the danger of infiltration, it begs the question: Do you […]

Read More →