by Syndicated News Feed | Aug 14, 2025 | Data Protection
Introduction In June 2025, the Department of Telecommunications released the Draft Telecommunications (Telecom Cyber Security) Amendment Rules, 2025. These proposed amendments aim to introduce a centralised framework to validate mobile numbers as part of a larger...
by Syndicated News Feed | Aug 13, 2025 | Data Protection
For local authority investigators, interviewing is at the heart of effective casework. Interviews aren’t just fact finding conversations; they are a formal investigative tool with legal significance. The way you conduct them can determine whether your evidence stands...
by Syndicated News Feed | Aug 13, 2025 | Data Protection
Introduction The Indian Computer Emergency Response Team, CERT-In, under the aegis of the Ministry of Electronics and Information Technology (MeitY), has issued guidelines titled the “Comprehensive Cyber Security Audit Policy Guidelines.” This aligns with India’s...
by Syndicated News Feed | Aug 11, 2025 | Security
Colleges and universities are frequently confronted with complex security and operational challenges. Their facilities often serve both public and private uses — concert venues, sports stadiums, research labs, residence halls — creating a dynamic landscape that...
by Syndicated News Feed | Aug 8, 2025 | Data Protection
ICO cookie compliance crackdown Earlier this year, the ICO (Information Commissioner’s Office) announced its intention to tackle cookie compliance across the UK’s top 1,000 websites. We were subsequently contacted by a company that operates one of those websites and...
by Syndicated News Feed | Aug 8, 2025 | Security
The Cybersecurity and Infrastructure Security Agency (CISA) defines de-escalation as a method to prevent potential violence. Individuals are encouraged to use purposeful actions, verbal communications and body language to calm a potentially dangerous situation. When...
by Syndicated News Feed | Aug 7, 2025 | Data Protection
Agentic AI is a different kind of AI. It’s not like the generative AI everyone’s talking about—the one that stitches together an answer based on what it knows or guesses when it doesn’t. That’s great for content creation, for generating reports, for summarizing data,...
by Syndicated News Feed | Aug 7, 2025 | Security
The SANS Institute is hosting its SANS Riyadh Cyber Leaders forum from August 24 to 28, 2025, at the Hyatt Regency Riyadh Olaya. The five-day event will provide intensive leadership and technical training to empower security managers and SOC leaders with the skills...
by Syndicated News Feed | Aug 7, 2025 | Data Protection
Freedom of Information (FOI) requests have revealed the rapidly increasing scale of police mass facial recognition searches against the passport and immigration databases. New figures reveal that the number of searches of the passport database has “skyrocketed” from 2...
by Syndicated News Feed | Aug 6, 2025 | Security
Cannabis facilities are expected to meet some of the most rigorous access control standards of any regulated industry. Every door matters, and every entry must be logged. Every secure area — from grow rooms to product vaults — is subject to inspection, and failure to...