Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Laws & Regulations

  1. Home
  2. Laws & Regulations

Category: Laws & Regulations

Incident Response Laws & Regulations

DORA explained: Requirements, penalties, and steps to complianceFeatured

What is DORA? DORA stands for the Digital Operational Resilience Act. It is the framework introduced by the European Commission to manage ICT risks and […]

March 12, 2024January 8, 2025
0
Technology

An overview of the EU’s Artificial Intelligence ActFeatured

What is the EU AI Act The European Union introduced the Artificial Intelligence Act (AI Act), a regulatory proposal concerning artificial intelligence within the EU. […]

February 9, 2024January 20, 2025
0
Make it to Santa's ‘Nice’ Cybersecurity list!
Laws & Regulations Reading

Make it to Santa’s ‘Nice’ Cybersecurity list!

With Christmas around the corner, we all hope to make it to Santa’s ‘Nice’ List! The rules of the game are simple: be good year-round, […]

December 20, 2021January 21, 2025
0
California-Consume-privacy-act
Compliance Laws & Regulations Research

The California Consumer Privacy Act

The California Consumer Privacy act In May 2018 when the General Data Protection Regulation (GDPR) came into effect, many organizations were not ready for it […]

December 3, 2019
0
Compliance Laws & Regulations

PCI DSS Penetration Testing Guidance

The Payment Card Industry Security Standards Council recently released their updated Information Supplement: Penetration Testing Guidance. The guidance document was last published in 2008 under […]

April 10, 2015
0
Case Studies Compliance Laws & Regulations

IT Act 2000 – Penalties, Offences With Case Studies

Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal […]

June 24, 2014January 10, 2025
6
Compliance Fundamentals Laws & Regulations Opinion Reading

Getting Your BYOD Policy Right

Bring your own device (BYOD) is the business policy of letting employees bring their own devices at workplace for doing work. The concept has gained […]

July 29, 2013
0
Laws & Regulations Opinion

India’s National Cyber Security Policy – Implications for the Private Sector

On the 2nd of July 2013, the Indian Government formally approved and published the National Cyber Security Policy (NCSP). The policy had been lying as a […]

July 21, 2013January 10, 2025
1

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top