News & Analysis as of

Algorithms Encryption

Eversheds Sutherland (US) LLP

Quantum computing and the threat to existing encryption: NIST releases post-quantum guidance

Imagine a world in which powerful computers can instantaneously break a company’s standard encryption, threatening the most valuable financial data, intellectual property, personal information, and even national security...more

HaystackID

Unpacking iOS 18’s New Privacy Features – A Digital Forensics Perspective

HaystackID on

With every iOS update, Apple continues to tighten its grip on user privacy. The newly introduced iOS 18 is no different, bringing a suite of privacy features that are bound to make our lives as digital forensic experts a tad...more

Pillsbury - Internet & Social Media Law Blog

From Encryption to Employment, U.S. Federal Agencies Brace for the Effects of Quantum Computing, AI and More

In this week’s edition of Consumer Protection Dispatch, we look at the latest regulatory developments from the U.S. Department of Commerce, Consumer Financial Protection Bureau, and the Securities and Exchange Commission...more

Fox Rothschild LLP

AI & You: Key Considerations for a Company’s Use of Artificial Intelligence Systems

Fox Rothschild LLP on

Businesses increasingly rely on technology containing Artificial Intelligence (AI) to streamline operations, enhance employee experiences and drive strategic decision-making. The integration of AI into work systems, including...more

Eversheds Sutherland (US) LLP

Getting ready for quantum computing: Managing the quantum threat

​​​​​​​Experts estimate that within the next decade or so, adversaries will have the capacity to use quantum computing to break the encryption on virtually all existing digital databases. This is why it is highly significant...more

Association of Certified E-Discovery...

Kangaroo Court: Quantum Computing – Thinking on the Future

The promise of quantum computers is that certain computational tasks might be executed exponentially faster on a quantum processor than on a classical processor. Quantum computing is a beautiful fusion of quantum physics...more

Hogan Lovells

Managing global telecom supply chains – What telecommunications companies need to know about trade control laws

Hogan Lovells on

Maintaining a global supply chain brings its share of commercial, financial, and regulatory risks. Increasingly, telecommunications companies with global operations and suppliers are finding that U.S. trade control laws...more

Bryan Cave Leighton Paisner

How to Design or Review an Encryption Policy

Encryption refers to the process of converting data into a form that is unreadable unless the recipient has a pre-designated algorithm, “key,” and password to convert the information into readable text. Most statutes,...more

Seyfarth Shaw LLP

The Patentability of Encryption Inventions

Seyfarth Shaw LLP on

Encryption seems to be in the news quite a bit lately. Electronic retailers and government organizations have become targets of computer hackers across the globe, attacking their servers and obtaining sensitive information...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide