www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1586
Public Scan
Submitted URL: https://go.techtarget.com/r/213685266/44220482/17?utm_content=eru-rd2-rcpC
Effective URL: https://www.computerweekly.com/news/252515140/European-Commission-proposes-new-cyber-security-regulations?utm_campaign=20220331...
Submission: On March 31 via api from SE — Scanned from DE
Effective URL: https://www.computerweekly.com/news/252515140/European-Commission-proposes-new-cyber-security-regulations?utm_campaign=20220331...
Submission: On March 31 via api from SE — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
Text Content
3 Trending Now Market eval: Secure web gatewaysDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * Market eval: Secure web gatewaysDownload Now * Hybrid work: How to achieve reliable connectivityDownload Now * How data layer technologies poise position financial institutions for successDownload Now Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * Sign up for our daily newsletter RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey * IT in France * IT in the Nordics Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Quality/governance * Data warehousing * Database management * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Compliance and storage * Backup * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * News EUROPEAN COMMISSION PROPOSES NEW CYBER SECURITY REGULATIONS NEW CYBER AND INFORMATION SECURITY REGULATIONS HAVE BEEN PROPOSED BY THE EUROPEAN COMMISSION TO CREATE A MINIMUM SET OF STANDARDS IN BOTH AREAS Share this item with your network: * * * By * Sebastian Klovig Skelton , Senior reporter Published: 25 Mar 2022 17:29 The European Commission (EC) has proposed two new regulations to establish common cyber and information security measures across the bloc, with the aim of bolstering resilience and response capacity against a range of cyber threats. Under the proposed cybersecurity regulation, which was published 22 March 2022, all European Union (EU) institutions, bodies, offices, and agencies will be required to have cyber security frameworks in place for governance, risk management, and control. They will also be required to conduct regular maturity assessments, implement plans for improvement, and share any incident-related information with Computer Emergency Response Team (CERT-EU) “without undue delay.” The regulation would also establish a new inter-institutional Cybersecurity Board to drive and monitor the implementation of the regulation. The new board will further help to steer CERT-EU, which will also have its mandate extended to fill the triple role of being an incident response coordination hub, a central advisory body, and a service provider. Under a separate Information Security Regulation proposal published the same day, the EC is seeking to create a minimum set of security rules to both enhance and standardise how EU public organisations protect themselves against evolving threats to their information. These rules will also provide for the secure exchange of information across the EU by establishing common practices and measures to protect information flows, including a shared approach to information categorisation based on the level of confidentiality. “In a connected environment, a single cyber security incident can affect an entire organisation. This is why it is critical to build a strong shield against cyber threats and incidents that could disturb our capacity to act,” said Johannes Hahn, the EU’s budget and administration commissioner, in a statement. “The regulations we are proposing today are a milestone in the EU cyber security and information security landscape. They are based on reinforced cooperation and mutual support among EU institutions, bodies, offices and agencies and on a coordinated preparedness and response. This is a real EU collective endeavour.” The EC has further claimed the changes are needed in the context of the Covid-19 pandemic and growing geopolitical challenges, and that the rules will strengthen inter-institutional cooperation, minimise risk exposure and generally bolster the EU’s security culture. The proposals – which must now be discussed by the European Parliament and Council - are in line with the EU’s Security Union Strategy, which was published in December 2020 and intended to bolster the bloc’s collective resilience against cyber threats. According to a World Economic Forum (WEF) report from January 2022, cyber security threats rank among the top risks facing the world, as threats such as ransomware and nation-state-backed attacks proliferate and organisations become more reliant on technology. “With cyber threats now growing faster than our ability to eradicate them permanently, it is clear that neither resilience nor governance are possible without credible and sophisticated cyber risk management plans,” said Carolina Klint, risk management leader for continental Europe at insurance broker and risk specialist Marsh. On 9 March 2022, European governments also drafted a declaration to reinforce the EU’s cyber security capacities, which included increasing EU funding to support national efforts and develop a strong cyber security ecosystem. The additional funding is supposed to help EU countries scale up their cyber capabilities by helping to create a market for trusted providers, as well as reinforcing the resilience of select operators that would be at risk during a conflict. The declaration also urged European authorities to come up with a series of recommendations on how to reinforce the resilience of Europe’s digital infrastructure. In the UK, the government is also seeking to make a series of updates to the 2018 Network and Information Systems (NIS) regulations, which were initially designed to protect the security of providers of critical national infrastructure (CNI) - in this case, utilities, transport, healthcare and communications – backed by multimillion-pound fines for non-compliance. These regulations will be expanded in their scope to include managed service providers (MSPs) and providers of specialised online and digital services, including managed security services, workplace services, and general IT outsourcing. The UK government launched a consultation for feedback on 19 January 2021. READ MORE ABOUT CYBER SECURITY RULES AND REGULATIONS * US president Joe Biden signed new cyber security incident reporting mandates into law on Tuesday 15 March, making it a legal requirement for operators of critical national infrastructure (CNI) to disclose cyber attacks to the government * Germany’s Federal Office for Information Security has made a formal recommendation that Kaspersky users in Germany replace the supplier’s antivirus protection software with alternative products, but will not enact an outright ban on the Russian firm * DCMS opens a consultation on new regulations, and a draft code of practice, that will supposedly help communications services providers fulfil the legal duties imposed on them under the Telecommunications (Security) Act that became law in November 2021 READ MORE ON HACKERS AND CYBERCRIME PREVENTION * FINNISH GOVERNMENT STRENGTHENS COUNTRY’S IT NETWORK SECURITY * WHICH? ONLINE BANKING INVESTIGATION REVEALS ‘WORRYING GAPS’ IN SECURITY By: Karl Flinders * CALIFORNIA’S CCPA AN OPPORTUNITY FOR SECURITY INDUSTRY TO DO BETTER By: Alex Scroxton * GOVERNMENT SEEKS VIEWS ON POST-BREXIT SECURITY ALIGNMENT By: Alex Scroxton Latest News * Lapsus$ cyber crime spree continues despite arrests * Spring4Shell zero-day sprung on security teams * How a woman CIO rose up the ranks in a Japanese firm * View All News Download Computer Weekly * In The Current Issue: * Raspberry Pi at 10: Cheaper than chips * Gartner: How to retain and motivate IT staff * How Dutch hackers are working to make the internet safe Download Current Issue Latest Blog Posts * You’ve just crossed over into the Dyson Zone – Downtime * The low-no-code series – Contentstack: Making a conscious compromise – CW Developer Network * View All Blogs Related Content * Government seeks views on post-Brexit security ... – ComputerWeekly.com * Which? online banking investigation reveals ‘worrying... – ComputerWeekly.com * Cyber security high on European Commission agenda – ComputerWeekly.com Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management SearchCIO * Lack of competition is driving federal budget antitrust hike In Biden's proposed budget, the FTC would gain an additional $139 million while the DOJ's antitrust division would see an $88 ... * CHIPS Act moves the needle on US chip manufacturing Not only does the CHIPS Act funnel billions into U.S. semiconductor chip manufacturing, it reflects a major change in how U.S. ... * Top 9 blockchain platforms to consider in 2022 Get the lowdown on the major features, differentiators, strengths and weaknesses of the blockchain platforms getting the most ... SearchSecurity * Viasat confirms cyber attack on Ukraine customers The U.S.-based satellite internet provider said a 'multifaceted and deliberate cyber attack' struck Viasat's KA-SAT network on ... * Axie Infinity hack results in $600M cryptocurrency heist Axie Infinity, whose developer was hacked this month, is a popular NFT-based video game in which players earn cryptocurrency by ... * Rapid7 finds zero-day attacks surged in 2021 Cybercriminals are turning bugs into exploits faster than ever, according to Rapid7, which found that the average time to known ... SearchNetworking * Aruba urges customers to adopt network as a service Aruba wants more customers to switch to network as a service, but companies benefiting from a standard product license are ... * Best practices for enterprise CBRS deployment Enterprises can use CBRS spectrum to deploy private cellular networks that offer reliable and predictable coverage. Learn about ... * Aruba Central basics key for Atmosphere attendees IT pros like to check out cutting-edge technology, but they say Aruba Central basics like device onboarding and data privacy are ... SearchDataCenter * The global state of data center sustainability Review green initiatives in the world of data centers: sustainable designs and practices, what other organizations are doing and ... * ServiceNow adds new RPA features to San Diego release Doubling down on its RPA initiative, ServiceNow unveiled the San Diego version of its Now Platform that contains an RPA Hub and a... * Nvidia beefs up its line of AI supercomputers, chips Nvidia rolls out a new GPU architecture, supercomputers and chips that in concert will aid developers in creating the hardware ... SearchDataManagement * Oracle HeatWave ML fuses machine learning with database The tech giant is continuing to build out the capabilities of its MySQL HeatWave cloud database with real-time elasticity, ... * Pinecone raises $28M to advance vector database The startup's database technology enables enterprises to use traditional data stores alongside vector-based data to support ... * DataStax Astra DB integrates real-time data streaming The database-as-a-service vendor advanced the change data capture capabilities of its cloud database with technology from its ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info Close