Tuesday, June 11 2024

When regulators squabble, who loses? Everyone. Regulatory disharmony is real, folks—and so far, we don’t see signs of the trend waning.

We recently examined the lack of harmonious regulatory policy towards cryptocurrency platforms. This dynamic, of course, isn’t unique to crypto: Complaints asking for consistent consent requirements across the European Union prompted the European Data Protection Board to adopt cookie consent guidelines.

The EDPB also responded the same way they always respond, by…wait for it…announcing a new taskforce.

The taskforce will almost certainly zero in on the Companies Formerly Known as FAANG. Big tech has been collecting data privacy missives from every regulator who’s paying attention—the European Commission, EDPB, Austrian data protection authority, Norwegian authority Datatilsynet, Irish Data Protection Commission, French CNIL, U.S. FTC, CFPB, and state attorneys general.

And yet, we think the most important story of the hour isn’t what regulators will or won’t do about Facebook, Google, Meta, Alphabet, and friends. We’re focused on the downstream effects: How do inconsistent cybersecurity directives affect other companies, especially midsized firms, which have historically been lightly regulated?

As they say, sometimes you don’t need a weatherman to know which way the wind blows. Chairs of the U.S. Securities and Exchange Commission and the Federal Trade Commission said they are eyeing changes to privacy and cybersecurity policy—oh, and NIST also has a couple hundred pages of updated guidance to add the privacy and security discussion.

So, who’s next in the firing line, beyond large tech firms? For starters, if the SEC has anything to say about it, hedge fund and private equity firms will start to see a lot more scrutiny.

A stronger focus on third-party service providers is also likely, and this won’t be limited to a handful of cloud giants. This week, SEC Chair Gary Gensler suggested new cybersecurity regulations will affect service providers such as investor reporting platforms, fund administrators, index providers, custodians, and others.

Previous

Cyber Deals: 1Password, Virtru, SoSafe, Anitian

Next

AaDya Security Raises $3.1M to Accelerate Expansion in the SMB-Focused Cybersecurity Market

Check Also

Widget

Don’t Miss

Best Security Information and Event Management (SIEM) Solutions

Lara Oporto

A Security Information and Event Management system (SIEM) is typically most needed in larger organizations or those with complex IT infrastructures where there’s a high volume of security events and logs generated from various sources. Companies often invest in SIEM when they require comprehensive visibility into their network activities and want to centralize security monitoring […]

Best Browser Security Products

Ellie Buscemi

What is Browser Security and how does it work? Browser Security is a subcategory of cybersecurity that focuses on minimizing a user’s vulnerability to cyber threats while they use the worldwide web. These cyber threats include phishing web pages, session hijacking and malware, which can be injected onto a device by means of tamped-with web […]

Headshot of BastionZero CEO Sharon Goldberg

Cloudflare Acquires BastionZero to Enhance SASE Offering

Nico Davidoff

Acquisition Aims to Boost Cloudflare One’s Capabilities Amidst Growing SASE Market Competition Cloudflare has acquired BastionZero, a zero trust infrastructure platform, in a move aimed at enhancing its Cloudflare One secure access service edge (SASE) offering. The acquisition underscores Cloudflare’s commitment to expanding its presence in the growing SASE market. Cloudflare reported first-quarter revenue of […]

Best Secure Access Service Edge Platforms

Lara Oporto

What is SASE and how does it work? Secure Access Service Edge (SASE) is an architectural model that combines network connectivity with security functions, all delivered through a unified cloud platform or centralized policy control. In contrast to the traditional approach, where network security relies on a multitude of distinct functionalities like firewalls, Virtual Private […]

Best Data Security Posture Management (DSPM) Products

Ellie Buscemi

What is Data Security Posture Management and how does it work? Data Security Posture Management (DSPM) tools focus on protecting data by continuously tracking where it is located and who has access to it. DSPM refers to a set of methods that cybersecurity professionals use to better understand their sensitive data like what it is, […]

Best Network Detection and Response (NDR) Platforms

Lara Oporto

What is Network Detection and Response? Network Detection and Response (NDR) products are cybersecurity solutions that focus on monitoring and analyzing network traffic to identify and address potential threats. Although NDR does not prevent cyberattacks from happening, NDR products focus on catching ongoing attacks before they cause harm. How does Network Detection and Response work? […]