#digital-customs-systems

[ follow ]
DevOps
fromFortune
1 day ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
#cybersecurity
Information security
fromNextgov.com
15 hours ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Cryptocurrency
fromnews.bitcoin.com
19 hours ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Artificial intelligence
fromwww.theguardian.com
3 hours ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Healthcare
fromSecuritymagazine
3 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
EU data protection
fromSecurityWeek
6 days ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
fromTheregister
20 hours ago

Chevin pulls the handbrake on FleetWave after security scare

A major outage of FleetWave affects customers in the UK and US due to cybersecurity precautions taken by Chevin Fleet Solutions.
Information security
fromNextgov.com
15 hours ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Cryptocurrency
fromnews.bitcoin.com
19 hours ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Artificial intelligence
fromwww.theguardian.com
3 hours ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Healthcare
fromSecuritymagazine
3 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
EU data protection
fromSecurityWeek
6 days ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
fromTheregister
20 hours ago

Chevin pulls the handbrake on FleetWave after security scare

A major outage of FleetWave affects customers in the UK and US due to cybersecurity precautions taken by Chevin Fleet Solutions.
World news
fromWIRED
16 hours ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
European startups
fromTNW | Finance
1 day ago

BILL lets enterprise suppliers collect from any SMB, even ones not on its platform

BILL's Supplier Payments Plus now allows enterprise suppliers to accept payments from any SMB customer, streamlining payment processes and reducing collection times.
EU data protection
fromCN Traveller
1 year ago

Fingerprints, face scans and automated systems: What the EU's new travel rules mean for British travellers

The EU's Entry/Exit System will be implemented on April 10, requiring biometric data from non-EU nationals traveling to EU countries.
E-Commerce
fromBusiness Matters
3 days ago

Digital Transformation in UK Retail: E-commerce Trends Reshaping the Shopping Experience

The UK retail sector is transforming through digital adoption, innovative strategies, and evolving consumer expectations.
#ice
UX design
fromEntrepreneur
2 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Non-profit organizations
fromNextgov.com
3 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Business
fromFast Company
2 days ago

This is the biggest risk a company can take in the age of AI

Organizations that continue transformation during uncertainty outperform those that slow down, treating turbulence as an opportunity for growth.
#ai-agents
Marketing tech
fromFast Company
3 days ago

In the age of AI agents, your customer may still buy from you, but they may no longer visit you

The rise of AI agents is shifting customer interactions away from traditional company-controlled interfaces.
fromnews.bitcoin.com
1 week ago
Information security

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Marketing tech
fromFast Company
3 days ago

In the age of AI agents, your customer may still buy from you, but they may no longer visit you

The rise of AI agents is shifting customer interactions away from traditional company-controlled interfaces.
Information security
fromnews.bitcoin.com
1 week ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
fromThe Verge
2 days ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
fromABC7 San Francisco
3 days ago

Amazon, UPS, FedEx, USPS add temporary fuel surcharges to offset extra costs

"Transportation costs are a big factor there. Every company that is involved and has logistics and they have to pay for gas, either they have to absorb this cost, or they will charge the third party that will provide this service. I'm not surprised this is happening, because at some point, Amazon will say we cannot absorb all this cost."
Alternative transportation
Europe news
fromwww.theguardian.com
6 days ago

Biometric checks stalled again for cross-Channel travellers

Passengers crossing from the UK to France will not face new biometric checks despite the EU's entry-exit system deadline approaching.
#ai-security
Information security
fromThe Hacker News
9 minutes ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
fromTechRepublic
2 weeks ago
Information security

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromThe Hacker News
9 minutes ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromTechRepublic
2 weeks ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Law
fromABA Journal
1 week ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
DevOps
fromTheregister
18 hours ago

AWS: Agents shouldn't be secret, so we built a registry

AWS Agent Registry enhances visibility and control over AI agents in corporate environments.
fromFuturism
1 week ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
Privacy professionals
fromSecurityWeek
1 day ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
fromTechzine Global
2 days ago

Supermicro launches investigation following case over server exports

Supermicro claims it is not a suspect in the case. However, the company did take action against the individuals involved. Two of them have been placed on leave, while a third person has been fired.
Intellectual property law
E-Commerce
from24/7 Wall St.
1 day ago

2 Stocks I'd Add to the Shopping Cart for the Agentic Commerce Revolution

AI shopping has the potential to revolutionize e-commerce by enhancing transaction ease and price comparison.
US politics
fromArs Technica
5 days ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
3 days ago

India Issues Tax Notices to Crypto Traders Over Unreported Activity From Earlier Years

India is intensifying scrutiny of cryptocurrency activity, issuing notices that may reopen past filings and pressure traders to justify discrepancies.
Cryptocurrency
fromTheregister
17 hours ago

US, UK, Canadian cops disrupt $45M global crypto scam

A global cryptocurrency scam was disrupted, recovering $12 million and identifying over 20,000 fraud-linked wallet addresses across 30 countries.
Cryptocurrency
fromBitcoin Magazine
2 days ago

Demand For Crypto Pay Surges, But Payroll Systems Fall Behind: Research

A significant portion of workers are interested in receiving part of their pay in cryptocurrency, despite limited employer offerings.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

India Issues Tax Notices to Crypto Traders Over Unreported Activity From Earlier Years

India is intensifying scrutiny of cryptocurrency activity, issuing notices that may reopen past filings and pressure traders to justify discrepancies.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#ai
fromForbes
1 week ago
E-Commerce

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
fromwww.businessinsider.com
5 days ago
Cryptocurrency

For crypto miners turned AI stars, the real test is about to come

Former crypto-mining companies are now key players in the AI sector due to their utility power contracts and demand for data centers.
DevOps
fromTheregister
1 day ago

Rebrand automation as 'zero-token architecture' to master AI

IT professionals can enhance productivity by rebranding existing automations as 'zero-token architecture' to manage AI costs effectively.
E-Commerce
fromForbes
1 week ago

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
European startups
fromTechRepublic
2 days ago

Trump Eyes Sweeping Expansion of China Tech Ban Across Critical Infrastructure

The White House is considering expanding the ban on Chinese equipment for critical infrastructure, impacting telecom networks and data centers.
fromThe Local France
6 days ago

Eurotunnel and Eurostar still not ready for EES rollout despite deadline

The new checks, part of the EU's new Entry/Exit System (EES), collect digital personal records of third country nationals travelling to the Schengen area and replace the manual stamping of passports.
EU data protection
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Standard Chartered to Fold Zodia Custody Into CIB Crypto Division

Standard Chartered plans to integrate Zodia Custody into its CIB division by April 2026 while maintaining its independent SaaS model for third-party banks.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromFuturism
4 days ago

China Cracking Down on the Types of AI That Are Tearing America Apart

China is implementing strict regulations on AI personalities to protect children and prevent addiction.
Information security
fromTechRepublic
1 day ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Artificial intelligence
fromInfoWorld
6 days ago

Google gives enterprises new controls to manage AI inference costs and reliability

Gemini API introduces Flex and Priority tiers for managing AI inference workloads based on criticality and cost.
#supply-chain-security
Information security
fromSecuritymagazine
3 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Information security
fromSecuritymagazine
3 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
European startups
fromTechCrunch
1 week ago

FedEx chooses partnerships over proprietary tech for its automation strategy | TechCrunch

FedEx partners with Berkshire Grey to develop robots for bulk package unloading, aiming to enhance warehouse automation.
#identity-management
fromThe Hacker News
1 day ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
2 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 day ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
2 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
fromWIRED
1 week ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
Information security
fromSecuritymagazine
2 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Information security
fromThe Hacker News
2 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
E-Commerce
fromSearch Engine Roundtable
3 weeks ago

Universal Commerce Protocol Get New Additions Including Cart & Catalog

Google's Universal Commerce Protocol adds optional cart, catalog, and identity linking capabilities to enable agents to complete purchases directly across the web without traditional storefronts.
Privacy technologies
fromTheregister
4 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Business intelligence
fromSecuritymagazine
1 month ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
fromSilicon Canals
3 days ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
#cloud-security
Information security
fromSecuritymagazine
1 week ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

World Cloud Security Day emphasizes the importance of securing cloud data, focusing on identity visibility and flexible cloud adoption for physical security.
Information security
fromInfoWorld
6 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Information security
fromSecuritymagazine
1 week ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

World Cloud Security Day emphasizes the importance of securing cloud data, focusing on identity visibility and flexible cloud adoption for physical security.
Information security
fromInfoWorld
6 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Information security
fromSilicon Canals
3 days ago

A single maintainer, a fake company, and a three-hour window: inside the Axios supply chain hijack - Silicon Canals

A single maintainer's vulnerability led to a significant security breach in a widely used JavaScript library, exposing thousands of systems to potential credential theft.
Privacy professionals
fromTheregister
3 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
fromTechRepublic
1 month ago

US CBP Says Its Systems Aren't Ready for Massive Tariff Refunds - TechRepublic

CBP told the court that its current setup is 'not well suited to a task of this scale.' The filing points specifically to the agency's Automated Commercial Environment, or ACE, the central platform used to process trade data, importer records, and duty transactions. In Brandon Lord's declaration, CBP said using the existing workflow would require more than 4.4 million labor hours to process more than 53.2 million entries tied to IEEPA duties.
European startups
Privacy technologies
fromwww.eastbaytimes.com
1 month ago

How business travelers overcome geo-blocking while abroad

Geo-blocking restricts international business travelers from accessing essential cloud-based tools and financial systems, creating significant productivity losses for East Bay companies operating remotely across borders.
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromElectronic Frontier Foundation
1 month ago

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.

The document acknowledges that a program by the agency to use "commercially available marketing location data" for surveillance drew from the process used to select the targeted ads shown to you on nearly every website and app you visit.
Privacy professionals
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
fromTechCrunch
2 months ago

Here's the tech powering ICE's deportation crackdown | TechCrunch

Cell-site simulators ICE has a technology known as cell-site simulators to snoop on cellphones. These surveillance devices, as the name suggests, are designed to appear as a cellphone tower, tricking nearby phones to connect to them. Once that happens, the law enforcement authorities who are using the cell-site simulators can locate and identify the phones in their vicinity, and potentially intercept calls, text messages, and internet traffic.
US politics
Information security
fromThe Hacker News
3 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
EU data protection
fromComputerWeekly.com
2 months ago

Auditing, classifying and building a data sovereignty strategy | Computer Weekly

Data sovereignty requires controlling data location and movement, auditing and classifying data, and implementing legal and technical controls to prevent foreign access and ensure compliance.
fromThe Business of Fashion
2 months ago

How Integrated Technology Is Reshaping Retail Operations

The technology underpinning retail operations is under scrutiny in 2026 as fashion executives look to streamline systems with the aim to unlock efficiency, cut costs and meet consumer expectations for speed and personalisation in the shopping journey. At the retail event Lightspeed Edge on 12 January, Lightspeed - the unified point-of-sale (POS) and payments platform for SMEs such as Apricot Lane Boutique and Neal's Yard Remedies - convened industry leaders to explore the strategic imperative for integrated technology ecosystems over siloed systems.
E-Commerce
Artificial intelligence
fromWIRED
2 months ago

CBP Wants AI-Powered 'Quantum Sensors' for Finding Fentanyl in Cars

U.S. Customs and Border Protection contracted General Dynamics, $2.4M, to prototype quantum sensors with an AI database to detect illicit substances in containers.
E-Commerce
fromPractical Ecommerce
1 month ago

Low-Value Imports Upend E.U. Ecommerce

Surging low-value imports priced ≤€150 flood the E.U. ecommerce market, reshaping competition, pressuring logistics and customs, and normalizing ultra-low price expectations.
EU data protection
fromTechzine Global
1 month ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
E-Commerce
fromArs Technica
2 months ago

eBay bans illicit automated shopping amid rapid rise of AI agents

eBay forbids third-party 'buy-for-me' agents and AI chatbots from accessing its platform without permission, signaling response to emerging agentic commerce.
fromTechCrunch
2 months ago

Exclusive: US cargo tech company publicly exposed its shipping systems and customer data to the web

For the past year, security researchers have been urging the global shipping industry to shore up their cyber defenses after a spate of cargo thefts were linked to hackers. The researchers say they have seen elaborate hacks targeting logistics companies to hijack and redirect large amounts of their customers' products into the hands of criminals, in what has become an alarming collusion between hackers and real-life organized crime gangs.
Information security
[ Load more ]