Remove Subscribe
Remove Computer and Electronics Remove Education Remove Personal data Remove Security
article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Cybersecurity laws and regulations encompass a range of legal requirements designed to protect information systems and data from cyber threats. These laws aim to establish standards for securing data, ensuring privacy, and mitigating risks associated with digital information. What are Federal Cybersecurity Regulations?

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Known data breached Pure Incubation Ventures Source (New) Professional services USA Yes 183,754,481 EasyPark Source 1 ; source 2 ; source 3 (Update) Software Sweden Yes 21,100,000 Cutout.Pro Source (New) Software Hong Kong Yes 19,972,829 Optum Source 1 ; source 2 (New) Healthcare USA Yes 6 TB Kumagai Gumi Group Co.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: 2 PB. Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number).

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Take a look at every data breach and cyber attack that we recorded in May in this blog. Meanwhile, you can stay up to date with the latest news by subscribing to our Weekly Round-up or visiting our blog. Entertainment law firm GSM&S hacked, exposing celebrities’ personal info (unknown). Data breaches.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Data breached: 4,186,879,104 messages. Keyboard app vulnerabilities reveal keystrokes to network eavesdroppers Security researchers have identified critical security vulnerabilities in Cloud-based pinyin keyboard apps from Baidu, Inc., Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology.