Latest Publications

Share:

Ransomware Reckoning – The New Bill Changes the Game

The Intelligence Authorization Act for Fiscal Year 2025 (S.4443) is a bold legislative step in addressing ransomware as a critical threat. The act’s provisions, from elevating ransomware to a national intelligence priority to...more

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications –PART II

In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications – PART I

In November of 2023, Meta launched a service in the European Union that allowed users to utilize the Facebook and Instagram platforms “ad free” for a monthly fee. The subscription service was meant to address regulatory...more

Balancing Act: Industry Concerns Over CISA’s Proposed Cyber Incident Reporting Rule

As discussed in our previous blog post, the Cybersecurity and Infrastructure Security Agency (CISA) is proposing a significant new rule to bolster the nation’s cyber defenses through mandatory incident reporting. While...more

Mandatory Cybersecurity Incident Reporting: The Dawn of a New Era for Businesses

A significant shift in cybersecurity compliance is on the horizon, and businesses need to prepare. Starting in 2024, organizations will face new requirements to report cybersecurity incidents and ransomware payments to the...more

Network Topology and Network Mapping: The NIST Cybersecurity Framework – Part 2

A previous installment discussed the centrality of network topology to an organization’s data security and outlined the legal framework and obligations incumbent upon many organizations in the U.S. The first installment can...more

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Navigating Data Ownership in the AI Age, Part 2: Frameworks Governing Data Ownership

The proliferation of AI-derived and processed data in the era of big data is occurring against a complex backdrop of legal frameworks governing ownership of and responsibilities with regard to that data. In a previous...more

Navigating Data Ownership in the AI Age, Part 1: Types of Big Data and AI-Derived Data

The emergence of big data, artificial intelligence (AI), and the Internet of Things (IoT) has fundamentally transformed our understanding and utilization of data. While the value of big data is beyond dispute, its management...more

Navigating OFAC Settlements: An In-Depth Analysis of Sanctions Violations and Compliance Lessons

The Office of Foreign Assets Control’s (OFAC) settlements in the second half of 2023 serve as cautionary tales for organizations navigating the complex landscape of international sanctions. These cases offer valuable insights...more

The U.S. Department of Commerce, Bureau of Industry Security, and E5 Partners Provide Guidance and Export Controls on Russia |...

In a coordinated effort to counter Russia's aggression against Ukraine, the Export Enforcement Five (E5) — comprising Australia, Canada, New Zealand, the United Kingdom, and the United States — have released unprecedented...more

U.S. Sanctions on Russia: Growing Risks for Turkish Companies

On Sept. 14, 2023, the U.S. government designated five Turkish companies for breaching U.S. sanctions against Russia. The designations should not have been a surprise, as Washington had been warning the Turkish government and...more

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

How Smart Is Your Artificial Intelligence Policy?

There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more

The Imperative of Cyber Preparedness: The Power of Tabletop Exercises

In an age where digital connectivity is rapidly advancing, cybersecurity has become an inescapable concern for organizations across industries. With cyber threats ranging from data breaches to ransomware attacks, it is...more

California Takes the Wheel: A Closer Look at Privacy in Connected Vehicles

California, home to the highest number of registered vehicles in the U.S., is at the forefront of a critical issue – the privacy practices of automobile manufacturers and vehicle technology firms....more

Cybersecurity Risks to AI Adoption in Construction

The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more

The Future of Construction: AI and Predictive Maintenance Part 1

The construction sector is known for its perennial pursuit of efficiency, quality, and safety. In recent years, one of the tools the sector has started leveraging to achieve these goals is predictive maintenance (PM),...more

Tabletop Exercises as Risk Mitigation Tools

As cyber threats have evolved and expanded, cybersecurity has emerged as a threat to organizations across sectors, and there is more urgency than ever for companies to remain vigilant and prepared. Cybersecurity incidents can...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 3

The third and final installment of this three-part series discusses the construction industry’s evolving landscape and the challenges it faces in the realm of cybersecurity, revealing how a comprehensive, data-centric...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 2

In today’s digital era, the construction industry faces a growing threat from cyber risks that can have significant impacts on projects and operations. As technology continues to revolutionize the industry, it is crucial for...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 1

The construction industry’s rapid digital transformation has opened the door to new cybersecurity challenges. As the sector adopts innovative technologies like cyber-physical systems, Building Information Modeling (BIM), and...more

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide