Latest Publications

Share:

Iran-Linked Cyberattack: What U.S. Companies Need to Know Now

On March 11, 2026, independent reports confirmed that one of the largest medical device companies in the United States was the target of a significant cyberattack attributed to Iran-linked threat actors. Although the...more

PRIVACY PODCAST EPISODE FOUR: The Blur Between Privacy and Security

The traditional separation between privacy and security is dissolving as technology and regulations force roles and responsibilities to converge. CISOs and CPOs increasingly face overlapping decisions — and overlapping...more

The CMMC Contract Clause Is Here: What Defense Contractors Need to Know

Last week marked an important milestone in the Cybersecurity Maturity Model Certification 2.0 (CMMC) program, the U.S. Department of Defense (DoD) program intended to ensure the security of sensitive DoD information in...more

State Data Breach Notification Laws - June 2025

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

President Biden Issues Second Cybersecurity Executive Order

In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more

State Data Breach Notification Laws - November 2024

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

U.S. State Comprehensive Consumer Data Privacy Law Comparison

Since the passage of the California Consumer Privacy Act (CCPA) in 2018, other U.S. states have followed suit by enacting comprehensive consumer data privacy laws in rapid succession. While these state consumer privacy laws...more

National Public Data Hack Exposes Millions: Essential Steps to Safeguard Your Identity and Combat Fraud

The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more

State Data Breach Notification Laws - September 2023

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

SEC Adopts New Cybersecurity Disclosure Rules

On July 26, 2023, the U.S. Securities Exchange Commission (“SEC”) adopted final rules regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The final rules require...more

Changing Landscape: Federal and State Regulators Focus on Protecting Consumer Health Data

Recent developments at the federal and state level demonstrate that regulators are focused on protecting consumer health data. Specifically, state and federal regulators want to close the gap between HIPAA-protected data and...more

AI in Health Care: Regulatory Landscape & Risk Mitigation

Health care, like most industries, is grappling with the proliferation of artificial intelligence (AI) and the novel risks and benefits it presents. Balancing these risks and benefits can be especially challenging for...more

State Data Breach Notification Laws - May 2023

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

Key Takeaways Bank Receiverships Week Two

Foley & Lardner LLP is closely monitoring the rapidly changing landscape surrounding the recent bank insolvencies. On Tuesday, March 21, at 5:00 p.m. CT, Foley hosted a webinar where a panel of presenters discussed the...more

State Data Breach Notification Laws - March 2023

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

HIPAA Breaches and Compliance: Key Findings & Lessons Learned from OCR’s Reports to Congress

The Office of Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) recently submitted two annual reports to Congress setting forth a summary of complaints and breaches reported to the OCR during...more

State Data Breach Notification Laws - September 2022

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

CPPA Approves Draft CPRA Regulations To Begin Formal Rulemaking Process

The California Privacy Protection Agency (CPPA) quietly issued the first draft of the California Consumer Privacy Act (CPRA) regulations and an Initial Statement of Reasons by attaching them to the June 8 board meeting...more

HHS Requests Comments on HIPAA/HITECH Act: Recognized Security Practices & Methodologies to Compensate Harmed Individuals

On April 4, 2022, the U.S. Department of Health and Human Services (HHS) released a Request for Information (RFI) seeking input from HIPAA-covered entities and business associates on how the industry understands and is...more

SEC Proposes New Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure

On March 9, 2022, the U.S. Securities Exchange Commission (the Commission) announced proposed amendments to its rules regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies...more

State Data Breach Notification Laws - March 2022

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

Practical Strategies to Combat Common Cybersecurity Threats and Mitigate Risk

What would you do if you woke up tomorrow and your company was experiencing a cybersecurity incident? What if IT systems were completely locked down? What if you could not use phones, check emails, or receive orders? What if...more

CMMC 2.0 Brings Increased Flexibility — and Increased Risks — for Contractors

Defense contractors and their subcontractors and supply chains that have been preparing for the challenge of complying with the Cybersecurity Maturity Model Certification (CMMC) recently received some welcome news from the...more

72 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide