No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more
On December 21, 2023, the Department of Defense (DoD) issued a memorandum (Memo) providing guidance and clarification on the security and cyber incident management requirements applicable for the use of external Cloud Service...more
The Biden Administration recently reaffirmed its continued focus on cybersecurity by announcing an Implementation Plan for the National Cybersecurity Strategy (the Plan). The Plan provides a roadmap covering the policies and...more
Welcome to the latest edition of Updata! Updata is an international report produced by Eversheds Sutherland’s dedicated Privacy and Cybersecurity team - it provides you with a compilation of key privacy and cybersecurity...more
On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more
While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more