Latest Publications

Share:

Cybersecurity Awareness Month 2025: How to Preserve Privilege in Cyber Investigations

In the aftermath of a cyberattack, forensic investigations are often launched under intense pressure to identify what went wrong, why, and how to fix it. A common practice following such an investigation is the preparation of...more

When it Rains it Pours: Lessons for Businesses Following the AWS Service Disruption

On October 21, 2025, much of the internet stopped behaving as expected. The largest cloud provider in the world, Amazon Web Services (AWS), suffered a significant service disruption that rippled through countless businesses,...more

Cybersecurity Awareness Month 2025: Don't Get Haunted by Shadow AI

"It's the boogeyman… and he's been here all along." – Laurie Strode, Halloween (1978) - As Cybersecurity Awareness Month unfolds and Halloween looms, one of the most chilling threats haunting today's businesses isn't a hacker...more

Immediate Action Items to Prepare for Website Automatic Opt-Out Signal Mandates

A growing number of U.S. states are requiring businesses to offer mechanisms in their privacy policies or online interfaces to allow individuals to "opt out" of data collection. However, in increasing numbers, many states are...more

Cybersecurity Awareness Month 2025: Avoid Cyber Claims Scares

October is Cybersecurity Awareness Month – a perfect time to take stock of what's really driving today's cyber losses and how your business may be affected. NetDiligence's 2025 Cyber Claims Study, analyzing more than 10,000...more

Cybersecurity Awareness Month 2025: A Comprehensive Guide to Navigating Modern Cyber Threats

Cyber threats don't wait for an invitation – and they certainly don't take a break when the calendar flips to October. As Cybersecurity Awareness Month 2025 begins, the stakes have never been higher. Every organization, from...more

Ten Key Insights from IBM's Cost of a Data Breach Report 2025

IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more

Web Scraping and the Rise of Data Access Agreements: Best Practices to Regain Control of Your Data

As the race for real-time data access intensifies, organizations are confronting a growing legal and operational challenge: web scraping. What began as a fringe tactic by hobbyists has evolved into a sophisticated,...more

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more

Recent CCPA Decision Portends Potential Expansion of Class Action Liability Exposure For Cookies, Pixels, and Tracking...

Wild, wild, west?  Web tracking may be the new frontier in class action litigation. With thousands of lawsuits filed in California and increasingly in other states against organizations, including many who may not realize the...more

Location Data Practices Targeted by California Lawmakers and Regulators

In late February, California lawmakers introduced new legislation that would impose sweeping restrictions on the use of location and tracking data. Known as the California Location Data Act (CLDA), this legislation goes a...more

The Colorado AI Act Shuffle: One Step Forward, Two Steps Back

Colorado waded into the deep end of AI regulation last year with the Colorado AI Act (Senate Bill 24-205), a sweeping law designed to rein in the risks of artificial intelligence (AI) and automated decision systems (ADS)....more

CFPB Proposes Rule to Regulate Data Brokers Selling Sensitive Information

In today's digital landscape, data brokers are like modern-day gold miners, sifting through the intimate details of our lives – our addresses, financial records, Social Security numbers – and quietly turning that information...more

California's New Generative AI Law – What Your Organization Needs to Know

California is making waves with its new AI law, Assembly Bill 2013 (AB 2013), set to take effect in 2026. This groundbreaking legislation (again) puts the state at the forefront of tech regulation by tackling one of AI's...more

Ten Best Practices to Protect Your Organization Against Cyber Threats

The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more

Second Circuit Ruling Expands VPPA Scope: What Organizations Need to Know

The U.S. Court of Appeals for the Second Circuit reinstated a proposed class action by Michael Salazar against a professional sports organization on October 15, 2024, alleging violations of the Video Privacy Protection Act...more

Data Breaches: The Not-So-Hidden Cost of Doing Business

In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more

Top Privacy and Cybersecurity Issues to Track In 2024

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Faking It: Protecting Your Financial Institution Against Deepfakes

Fraudulent activity in the financial industry is nothing new. The techniques employed by fraudsters have ranged from fake check fraud and credit card fraud to identity theft and financial account takeovers. For years,...more

ChatGPT in the Crosshairs: How the EU's AI Act May Affect Your Use of Generative AI

The era of generative AI is here. The surge in popularity of ChatGPT has created a massive disruption as companies balance the benefit of accelerated productivity against the potential risks. The tension between innovation...more

SEC Issues Multiple Cybersecurity Rule Proposals

The Securities and Exchange Commission (SEC) continued its focus on cybersecurity regulations this month by announcing three new proposed rules and re-opening the comment period on an additional proposed rule from last year....more

VPPA Claims Are on the Rise – Latest Trend in Consumer Privacy Class Action Litigation

It's no secret that plaintiffs' firms have been developing legal theories relating to third-party software technologies used on websites. This includes a recent spike in lawsuits alleging that websites running the Meta...more

NCUA Approves New Cyber Incident Reporting Requirements: What Credit Unions Need to Know

The National Credit Union Administration (NCUA) has approved new cyber incident reporting requirements for credit unions. Under the final rule, federally insured credit unions will be required to notify the NCUA of a...more

54 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide