Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more
10/20/2025
/ Artificial Intelligence ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Deep Fake ,
Incident Response Plans ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Supply Chain ,
Third-Party Risk
Startups often operate with tight budgets and lean teams, but implementing foundational cybersecurity and privacy practices is essential from day one. As startups collect customer and employee data and build digital...more
9/18/2025
/ Compliance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Employee Training ,
Incident Response Plans ,
Privacy Laws ,
Risk Assessment ,
Risk Management ,
Startups
On September 9, 2025, the Department of Defense (DoD) published a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to incorporate contractual requirements to implement the Cybersecurity...more
Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more
On March 9, 2023, the Securities and Exchange Commission (“SEC”) announced that Blackbaud Inc. (“Blackbaud”) agreed to pay $3 million to settle charges for alleged misleading disclosures about its 2020 ransomware attack and...more
With high-profile cybersecurity incidents hitting the headlines, President Biden’s recent cybersecurity executive order seeks to strengthen security practices at federal agencies and government contractors. But what does the...more
12/28/2021
/ Biden Administration ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Executive Orders ,
Popular ,
Private Sector ,
Ransomware ,
Risk Management
On July 28, 2021, President Biden signed a national security memorandum that seeks to “significantly improve” the cybersecurity of critical infrastructure systems....more