Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more
10/20/2025
/ Artificial Intelligence ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Deep Fake ,
Incident Response Plans ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Supply Chain ,
Third-Party Risk
On September 9, 2025, the Department of Defense (DoD) published a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to incorporate contractual requirements to implement the Cybersecurity...more
Like a zombie apocalypse, hordes of California Invasion of Privacy Act (“CIPA”) claims have chased corporate defendants to court where they were held off for a time, until, clawing at the courthouse doors, CIPA claims broke...more