News & Analysis as of

Supply Chain Data Security

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

Foley & Lardner LLP

Technology Trends in Manufacturing and Associated Legal Risk Management: Driving Technological Advancement with an Ecosystem View 

Foley & Lardner LLP on

The importance of building technology-driven manufacturing businesses with an ecosystem focus—i.e., a comprehensive view of the complex network of suppliers, partners, and customers in a market—emerged as a critical theme for...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

Foley & Lardner LLP

The Dawn of AI in Manufacturing: Understanding Its Wide Reaching Impact on Industry

Foley & Lardner LLP on

In the contemporary landscape of manufacturing, a silent revolution is taking place, driven by the integration of artificial intelligence (AI) into various processes. As factories become smarter and more interconnected, AI is...more

American Conference Institute (ACI)

Industry Responses to the U.S. Outbound Investment Regulatory Regime

The only thing truly certain about the proposed U.S. outbound investment regulatory regime is that a lot of uncertainty remains. But industry responses garnered during the comment period may, at least partly, foretell the...more

Proskauer - Regulatory & Compliance

White House Updates Critical and Emerging Technologies List to Address AI, Data Security, Space and Geopolitical Competition

Implications for CFIUS Reporting and Review - The Executive Branch, through the National Science and Technology Council and the National Security Council, committed in 2020 to identify that are potentially significant to...more

Baker Donelson

Top Privacy and Cybersecurity Issues to Track In 2024

Baker Donelson on

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Akin Gump Strauss Hauer & Feld LLP

Key Provisions in the NDAA for TMT Companies

On December 14, 2023, Congress passed an $874.2-billion defense authorization bill, sending it to the White House for President Biden’s signature. This alert provides a summary of key provisions of the National Defense...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

ArentFox Schiff

The Generative AI Revolution: Key Legal Considerations for the Consumer Products Industry

ArentFox Schiff on

For better or worse, generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making...more

Paul Hastings LLP

FCC Announces Privacy Task Force

Paul Hastings LLP on

The FCC recently announced the formation of a “Privacy and Data Protection Task Force” to be headed up by the Enforcement Bureau. The task force has a mandate to “coordinate across the agency” on rulemaking, enforcement, and...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Hogan Lovells

NIST prepares for Cybersecurity Framework 2.0, with increased focus on governance and supply chain

Hogan Lovells on

The US government continues to refine its influential cybersecurity guidance, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), with a substantial update to the CSF expected later this...more

Ankura

Trends and Moments that Defined 2022 & Predictions for 2023

Ankura on

While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more

Sheppard Mullin Richter & Hampton LLP

Do Business With the Federal Government? Here’s a 2022 Cybersecurity Recap: Part Three - Secure Software Development Attestation...

Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more

Wiley Rein LLP

Wireless Roundup (November 2022)

Wiley Rein LLP on

SEC Requests Comment on Incident Reporting NPRM for Certain Filings Affected by Technical Glitch: On October 18, the Securities and Exchange Commission (SEC) published a Notice announcing it has re-opened for 14 days the...more

Bradley Arant Boult Cummings LLP

Executive Order Clarifies Focus and Five Factors for Future CFIUS Reviews

President Biden issued Executive Order (EO) 14083 on September 15, 2022, establishing five factors for reviews by the Committee on Foreign Investment in the U.S. (CFIUS), and areas of heightened scrutiny for transactions...more

Ankura

Outsourcing Services: An Increasingly Common Origin for Insider Threats in the Supply Chain

Ankura on

On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly presents...more

Mitratech Holdings, Inc

[Webinar] How to Manage Cybersecurity Maturity in Your Supply Chain - October 5th, 10:00 am EST

Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more

Arnall Golden Gregory LLP

Contracting for Supply Chain Cybersecurity: Recent Report Provides Insight on Best Practices

Introduction - Enterprises are increasingly reliant on complex and interconnected ecosystems of technology solutions. Companies are reducing their dependence on the legacy monolithic highly customized solutions, instead...more

Morgan Lewis - Tech & Sourcing

Considering Security, Audit, and Other Key Provisions When Your Supplier Shifts to a More Permanent Remote Work Model

With the COVID-19 pandemic, many industries experienced a major shift in how the personnel of key suppliers worked, with “nonessential” personnel in large part working remotely. When this shift to remote work first happened...more

American Conference Institute (ACI)

[Event] 2nd National Forum on Team Telecom - April 25th, Washington, DC

Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

85 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide