News & Analysis as of

Cloud Computing Data Security Cybersecurity

Orrick, Herrington & Sutcliffe LLP

The European Data Act: 5 Things Cloud Services Provider Should Know

This Essential Guide to the European Data Act is part of Orrick's Cybersecurity & Privacy Compass Series. The Cybersecurity & Privacy Compass is your global guide to the evolving cybersecurity and privacy regulatory...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection - 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection: 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Wilson Sonsini Goodrich & Rosati

First Proposed Rules Under Biden AI Order Issued as Part of Larger New Customer Cyberthreat Disclosure Requirements for Cloud...

On January 29, 2024, the U.S. Department of Commerce (Commerce) issued a notice of proposed rulemaking (NPRM) seeking comment on draft rules establishing customer information collection and reporting obligations for certain...more

Trusaic

Is Data Security A Priority for Your Workplace Equity Provider?

Trusaic on

Cyberattacks continue to rise, increasing the need for robust data security. Global weekly attacks rose by 7% during the first quarter of 2023, versus the same quarter last year. Each organization is estimated to face on...more

Alston & Bird

Chinese Hackers Exploit Gap in Cloud Environment Used by U.S. Government

Alston & Bird on

According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more

Holland & Knight LLP

Holland & Knight Data Privacy and Security Report: April 2023

Holland & Knight LLP on

Welcome to Holland & Knight's monthly data privacy and security news update that includes the latest in policy, regulatory updates and other significant developments. ...more

Holland & Knight LLP

Holland & Knight Data Privacy and Security Report: March 2023

Holland & Knight LLP on

Welcome back to Holland & Knight's monthly data privacy and security news update that includes the latest in policy, regulatory updates and other significant developments. ...more

Fenwick & West LLP

Launch of Public RFI Signals FTC Scrutiny of Cloud Computing Industry

Fenwick & West LLP on

On March 22, 2023, the Federal Trade Commission (FTC) announced a request for information (RFI) seeking public comments on business practices in the cloud computing industry. The RFI focuses on three intertwined aspects of...more

Orrick, Herrington & Sutcliffe LLP

FTC asks how cloud computing affects competition and data security

On March 22, the FTC announced it is seeking information on cloud computing providers’ business practices with respect to the potential impact on competition and data security. ...more

Fenwick & West LLP

What Companies Need to Know About the New National Cybersecurity Strategy

Fenwick & West LLP on

The White House announced last Thursday its highly anticipated National Cybersecurity Strategy (NCS). Although largely aspirational and short on concrete plans, the 39-page NCS is the Biden administration’s most ambitious...more

Kilpatrick

10 Key Takeaways - The Impact of Adopting New Technologies on the Negotiation of Cloud-Based Contracts

Kilpatrick on

Kilpatrick Townsend’s Farah Cook recently participated on a panel discussion, “The Impact of Adopting New Technologies on the Negotiation of Cloud-Based Contracts,” at the 36th Annual National Bar Association Commercial Law...more

Ankura

Trends and Moments that Defined 2022 & Predictions for 2023

Ankura on

While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more

Morgan Lewis - Tech & Sourcing

Governments Worldwide Accelerate Cloud Adoption

Although data security concerns may have held back early adoption, the COVID-19 pandemic accelerated cloud usage and digital transformation within public service organizations in many countries around the world. In a recent...more

Venable LLP

Identity as a Key Enabler for Cloud

Venable LLP on

Legacy identity and access management (IAM) is often considered a cumbersome, complex, and archaic monolith. In particular, legacy IAM often requires lengthy development time for updates and onboarding new applications,...more

NAVEX

Strengthening American Cybersecurity Act of 2022

NAVEX on

On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Barnea Jaffa Lande & Co.

Do You Own a Database? You’re Also Responsible for Actions Performed by Third Parties

The Black Shadow hacking group’s attack on Cyberserve, reported a few days ago, has resulted (at this point in time) in the leaking of a database with more than 800,000 records pertaining to various individuals and the...more

Society of Corporate Compliance and Ethics...

Chris Ford on Compliance and Cloud Computing

While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more

Morgan Lewis - Tech & Sourcing

Coalition of European Banks Calls for Model Cloud Services Terms

The European Cloud User Coalition (ECUC) published a paper (the Position Paper) on May 17 recommending, among other matters, the adoption of “model clauses” for the long-term compliant use of cloud technologies....more

Reveal

Ramping Up Cloud Usage for Government Agencies

Reveal on

As the COVID-19 pandemic and social distancing enforced remote work only accelerated the move to the cloud for many organizations, it should come as no surprise that the use of cloud-based solutions continues to be on the...more

Wiley Rein LLP

Tech Risk Assessments: Cloud Services Under the Microscope?

Wiley Rein LLP on

The old saying goes, personnel is policy. This may be particularly true at this point in federal cybersecurity policy, where multiple agencies and Congressional committees play changing roles, including expanding capacities...more

61 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide