No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
On January 29, 2024, the Department of Commerce, Bureau of Industry and Security (BIS) released a proposed rule (Proposed Rule) that would require U.S. cloud services providers (a.k.a. Infrastructure as a Service, or IaaS,...more
The Federal Trade Commission (FTC) held a virtual FTC Tech Summit focused on artificial intelligence (AI) and AI's impact on competition and consumers on Jan. 25, 2024. The half-day event featured a diverse set of speakers...more
"We provide security and performance for millions of Internet properties and offer great functionality such as SSL and content distribution to every website on our network. Our services run silently in the background, keeping...more
Recent legal tech layoffs are part of a larger trend of cutbacks in the tech industry. What will the consequences be? We can look at the volatile history of tech for clues. With the looming possibility of a recession,...more
On February 8, 2023, the U.S. Department of the Treasury released a report citing its “findings on the current state of cloud adoption in the sector, including potential benefits and challenges associated with increased...more
The U.S. government’s national security and economic priorities around encouraging and adopting innovation is on full display in the soon-to-be-finalized Fiscal Year 2023 National Defense Authorization Act (NDAA). In this...more
Welcome to the latest edition of Updata! Updata is an international report produced by Eversheds Sutherland’s dedicated Privacy and Cybersecurity team - it provides you with a compilation of key privacy and cybersecurity...more
Efficiency, scalability, speed, increased cost savings, and advanced security for highly sensitive data remain in high demand by users of eDiscovery services. To meet that demand, cloud technology promised several of those...more
On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more
On December 2, 2021, the Federal Trade Commission (“FTC”) announced that it had filed an administrative complaint (the “Complaint”) to block Nvidia Corp.’s (“Nvidia”) $40 billion acquisition of U.K. chip design provider Arm...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
The Situation: The health care sector is currently going through a digital transformation phase with the promise of achieving improved patient care and higher efficiency—and the implementation of cloud-based services is a...more
Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more
Please join us for our annual exploration of cutting-edge legal, business, and technology issues in Artificial Intelligence, Big Data and the Cloud as these sectors become the most active and important for technology law and...more
As part of a multi-faceted deal, Google will become a validator node for Theta’s Mainnet 2.0. As part of the deal, Google Cloud will become Theta’s preferred cloud provider. Theta also plans to further collaborate with...more
The long wait is over – the Internal Revenue Service (IRS) has finally issued proposed regulations (the Cloud Regulations) addressing the tax treatment of cloud transactions. Until now, there was no guidance specifically...more
The Financial Stability Board has published two reports on: (i) BigTech in finance and (ii) third-party dependencies on cloud services. The reports form part of the FSB’s ongoing work to analyze structural changes within the...more
European financial institutions (competent authorities, credit institutions, and investment firms as defined in EU Regulation No. 575/2013, collectively Institutions) have been instructed to comply with the European Banking...more
Cloud computing is a subscription-based service where a person or business can obtain networked storage space and computer resources for a fee. There are different types of cloud computing services. The two most...more
In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more
On April 16, 2018, Beazley Group issued a report highlighting increased attacks on Microsoft’s cloud-based business products and services. The report stated that successful attacks typically are achieved by tricking employees...more