by Syndicated News Feed | Sep 8, 2025 | Data Protection
We have been concerned about the expansion of EdTech includes a wide range of tools that enable the surveillance of students and academic staff, often facilitating monitoring by both public authorities and private entities.We brought our concerns responding to the UN...
by Syndicated News Feed | Sep 8, 2025 | Data Protection
This month marks 23 years of Act Now Training. We delivered our first course in 2003 (on the Data Protection Act 1998!) at the National Railway Museum in York. Fast forward to today, and we deliver over 300 training days a year on AI, GDPR, records management,...
by Syndicated News Feed | Sep 8, 2025 | Data Protection
Act Now is delighted to welcome Raz Edwards, a leading expert in health sector information governance, to our team of associates. Raz brings over 17 years of experience as a Data Protection Officer, including more than a decade within the NHS. She currently serves as...
by Syndicated News Feed | Sep 5, 2025 | Data Protection
Google’s data is your dataMaking data about how Google’s search works available to others may be intended to help level the playing field (though we tend to agree with those who think that more stringent and more timely action was justified). But it also has...
by Syndicated News Feed | Sep 4, 2025 | Data Protection
Introduction Following the Presidential assent on 22.08.2025 and Gazette publication, the Promotion and Regulation of Online Gaming Act, 2025 is now law. The new Act aims to encourage and legally recognise e-sports and online social games while completely banning...
by Syndicated News Feed | Sep 3, 2025 | Data Protection
Your vendors are trusted partners, essential to daily operations. But to cybercriminals, they’re the perfect disguise. Much like traditional business email compromise (BEC), vendor email compromise (VEC) involves the misuse of a familiar identity. In these...
by Syndicated News Feed | Sep 3, 2025 | Data Protection
Why legacy access models fail, and how modern identity platforms are redefining third-party risk. As a long-time CISO and before that having led B2B and Third-Party Connectivity technology service teams, I’ve witnessed firsthand how third-party access remains one of...
by Syndicated News Feed | Sep 3, 2025 | Data Protection
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world security breaches. The report presents the narrative of each incident, as well as the relevant cloud security risks and mitigations. Today we’re reflecting on the final incident...
by Syndicated News Feed | Sep 3, 2025 | Data Protection
Endpoint Detection and Response (EDR) solutions have become a necessary final line of defense on endpoints. They monitor processes, flag anomalies, respond automatically to suspicious activity, and provide important telematics for incident responders. But attackers...
by Syndicated News Feed | Sep 3, 2025 | Data Protection
Written by: Ken Huang, CSA Fellow, Co-Chair of CSA AI Safety Working Groups Hammad Atta Founder & AI Technology Advisor – Qorvexconsulting Research Dr. Zeeshan Baig – Global Partner, AI Threat Modeling & Security – Qorvexconsulting Research Dr. Yasir Mehmood...