Latest Publications

Share:

Cybersecurity Awareness Month 2025: How to Preserve Privilege in Cyber Investigations

In the aftermath of a cyberattack, forensic investigations are often launched under intense pressure to identify what went wrong, why, and how to fix it. A common practice following such an investigation is the preparation of...more

When it Rains it Pours: Lessons for Businesses Following the AWS Service Disruption

On October 21, 2025, much of the internet stopped behaving as expected. The largest cloud provider in the world, Amazon Web Services (AWS), suffered a significant service disruption that rippled through countless businesses,...more

Cybersecurity Awareness Month 2025: Don't Get Haunted by Shadow AI

"It's the boogeyman… and he's been here all along." – Laurie Strode, Halloween (1978) - As Cybersecurity Awareness Month unfolds and Halloween looms, one of the most chilling threats haunting today's businesses isn't a hacker...more

Immediate Action Items to Prepare for Website Automatic Opt-Out Signal Mandates

A growing number of U.S. states are requiring businesses to offer mechanisms in their privacy policies or online interfaces to allow individuals to "opt out" of data collection. However, in increasing numbers, many states are...more

Cybersecurity Awareness Month 2025: Avoid Cyber Claims Scares

October is Cybersecurity Awareness Month – a perfect time to take stock of what's really driving today's cyber losses and how your business may be affected. NetDiligence's 2025 Cyber Claims Study, analyzing more than 10,000...more

Cybersecurity Awareness Month 2025: A Comprehensive Guide to Navigating Modern Cyber Threats

Cyber threats don't wait for an invitation – and they certainly don't take a break when the calendar flips to October. As Cybersecurity Awareness Month 2025 begins, the stakes have never been higher. Every organization, from...more

AI and Privacy on a Legal Collision Course: Steps Businesses Should Take Now

The continued, rapid advancement of Artificial intelligence (AI) technologies comes with increasing risks for businesses, demanding that they navigate such issues more carefully than ever. Considering recent privacy class...more

Ten Key Insights from IBM's Cost of a Data Breach Report 2025

IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more

Web Scraping and the Rise of Data Access Agreements: Best Practices to Regain Control of Your Data

As the race for real-time data access intensifies, organizations are confronting a growing legal and operational challenge: web scraping. What began as a fringe tactic by hobbyists has evolved into a sophisticated,...more

The GENIUS Act: A New Era for Stablecoins Begins – What the Fintech, Investment and Banking Industry Sectors Need to Know?

On July 18, 2025, President Trump signed into law the Guiding and Establishing National Innovation for U.S. Stablecoins Act of 2025 – better known as the GENIUS Act. The GENIUS Act establishes the most comprehensive federal...more

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

California AG Secures Landmark Privacy Settlement Over Tracking: What It Means for Your Website

In a record-setting enforcement action under the California Consumer Privacy Act (CCPA), the California Attorney General (AG) announced a $1.55 million settlement with Healthline Media, a popular online publisher of health...more

The Perils of Legal Hallucinations and the Need for AI Training for Your In-House Legal Team!

Generative AI is rewriting how lawyers work at record speed, but is also quietly flooding Courts with phantom citations and invented case law along the way. In recent months, a number of judges across the country have...more

Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more

T-Minus Two Months: Another State Enters the National Stage – Preparing for the Tennessee Information Protection Act

Effective July 1, 2025, Tennessee enters the national privacy conversation with the Tennessee Information Protection Act (TIPA), becoming the latest state to enact a comprehensive consumer data privacy law. However, this...more

Recent CCPA Decision Portends Potential Expansion of Class Action Liability Exposure For Cookies, Pixels, and Tracking...

Wild, wild, west?  Web tracking may be the new frontier in class action litigation. With thousands of lawsuits filed in California and increasingly in other states against organizations, including many who may not realize the...more

Recent Wiretapping Class Action Dismissal Offers Compliance Lessons

In late March, an online retailer successfully asserted consent as a complete defense to a putative Pennsylvania Wiretapping and Electronic Surveillance Control Act of 1978 (WESCA) class action lawsuit, resulting in the...more

Location Data Practices Targeted by California Lawmakers and Regulators

In late February, California lawmakers introduced new legislation that would impose sweeping restrictions on the use of location and tracking data. Known as the California Location Data Act (CLDA), this legislation goes a...more

The Colorado AI Act Shuffle: One Step Forward, Two Steps Back

Colorado waded into the deep end of AI regulation last year with the Colorado AI Act (Senate Bill 24-205), a sweeping law designed to rein in the risks of artificial intelligence (AI) and automated decision systems (ADS)....more

AI Disclosures Under the Spotlight: SEC Expectations for Year-End Filings

The Securities and Exchange Commission (SEC) is increasing its scrutiny on artificial intelligence (AI)-related disclosures; therefore, companies must tread carefully as year-end reporting season approaches. Specifically,...more

How Remote Hiring Practices Could Lead to Infiltration of Your Organization: North Korea Operatives are Exploiting Remote Hiring...

In today's fast-paced digital world, businesses often seek to access a global pool of skilled professionals by turning to remote talent to fill gaps in their IT needs. Although this practice has many advantages, it also...more

CFPB Proposes Rule to Regulate Data Brokers Selling Sensitive Information

In today's digital landscape, data brokers are like modern-day gold miners, sifting through the intimate details of our lives – our addresses, financial records, Social Security numbers – and quietly turning that information...more

California's New Generative AI Law – What Your Organization Needs to Know

California is making waves with its new AI law, Assembly Bill 2013 (AB 2013), set to take effect in 2026. This groundbreaking legislation (again) puts the state at the forefront of tech regulation by tackling one of AI's...more

Ten Best Practices to Protect Your Organization Against Cyber Threats

The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more

New York DFS Releases AI Cybersecurity Guidance

The New York Department of Financial Services (NYDFS) issued new guidance (the Guidance) on October 16, 2024, to help state-regulated financial institutions mitigate the myriads of cybersecurity risks posed by artificial...more

70 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide