News & Analysis as of

Cloud Computing Cybersecurity Data Protection

Pillsbury - Gravel2Gavel Construction & Real...

Data Centers: A Field Guide

By one count, worldwide there were some 11,800 data centers in early 2024. Within that census are facilities so small that they fit in office building closets, while others are among the largest manmade structures on the...more

Baker Botts L.L.P.

UK data centres designated as ‘critical national infrastructure’: Supporting the conditions for investor confidence

Baker Botts L.L.P. on

In what has been seen as an acknowledgement of the fundamental importance of data centres to the functioning of the UK economy and society, the UK Government has acted to designate data centres as ‘critical national...more

Array

Emerging Trends in Court Reporting for 2025: Legal Technology and Advantages for Law Firms

Array on

The court reporting industry is evolving rapidly, propelled by technological advancements and the increasing demand for efficiency in the legal sector. For 2025, trends such as artificial intelligence (AI), real-time...more

HaystackID

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

HaystackID on

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Sheppard Mullin Richter & Hampton LLP

Looking Beyond FedRAMP – Lessons from the U.S. Treasury Cybersecurity Incident

In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more

Mayer Brown

New EU Cyber Rules (NIS2) Take Effect; Implementing Rules Adopted

Mayer Brown on

On 17 October 2024, the European Commission adopted the first Implementing Regulation under the Network and Information Security 2 Directive (EU) 2022/2555 (NIS2), focusing on digital infrastructures and services. The...more

Orrick, Herrington & Sutcliffe LLP

The European Data Act: 5 Things Cloud Services Provider Should Know

This Essential Guide to the European Data Act is part of Orrick's Cybersecurity & Privacy Compass Series. The Cybersecurity & Privacy Compass is your global guide to the evolving cybersecurity and privacy regulatory...more

HaystackID

[Webcast Transcript] Getting Things Done with GAI

HaystackID on

Editor’s Note: During this webcast, industry leaders discussed using generative AI (GAI) in the legal and cybersecurity fields. The speakers, John Brewer, Anya Korolyov, Chris Wall, and Bernie Gabin, all experts in AI and...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection - 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection: 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Wilson Sonsini Goodrich & Rosati

First Proposed Rules Under Biden AI Order Issued as Part of Larger New Customer Cyberthreat Disclosure Requirements for Cloud...

On January 29, 2024, the U.S. Department of Commerce (Commerce) issued a notice of proposed rulemaking (NPRM) seeking comment on draft rules establishing customer information collection and reporting obligations for certain...more

Alston & Bird

Chinese Hackers Exploit Gap in Cloud Environment Used by U.S. Government

Alston & Bird on

According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more

Holland & Knight LLP

Holland & Knight Data Privacy and Security Report: April 2023

Holland & Knight LLP on

Welcome to Holland & Knight's monthly data privacy and security news update that includes the latest in policy, regulatory updates and other significant developments. ...more

Holland & Knight LLP

Holland & Knight Data Privacy and Security Report: March 2023

Holland & Knight LLP on

Welcome back to Holland & Knight's monthly data privacy and security news update that includes the latest in policy, regulatory updates and other significant developments. ...more

Fenwick & West LLP

What Companies Need to Know About the New National Cybersecurity Strategy

Fenwick & West LLP on

The White House announced last Thursday its highly anticipated National Cybersecurity Strategy (NCS). Although largely aspirational and short on concrete plans, the 39-page NCS is the Biden administration’s most ambitious...more

Kilpatrick

10 Key Takeaways - The Impact of Adopting New Technologies on the Negotiation of Cloud-Based Contracts

Kilpatrick on

Kilpatrick Townsend’s Farah Cook recently participated on a panel discussion, “The Impact of Adopting New Technologies on the Negotiation of Cloud-Based Contracts,” at the 36th Annual National Bar Association Commercial Law...more

Robinson+Cole Data Privacy + Security Insider

CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite

On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) issued an Alert outlining multiple Common Vulnerabilities and Exposures...more

Robins Kaplan LLP

US and EU Announce Preliminary Agreement on Data Transfers

Robins Kaplan LLP on

Nearly two years after the European Union’s top court overturned a transatlantic agreement regulating data flows between the U.S. and the EU after finding American “safeguards on Europeans’ data to be insufficient,” President...more

NAVEX

Strengthening American Cybersecurity Act of 2022

NAVEX on

On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more

Bilzin Sumberg

Recent Settlements and Penalties Show Perils of Data Breaches

Bilzin Sumberg on

Two major U.S. financial institutions, Morgan Stanley and Capital One, recently agreed to resolve separate class action lawsuits by paying, in the aggregate, hundreds of millions of dollars in compensation for massive data...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Womble Bond Dickinson

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Womble Bond Dickinson on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

87 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide