News & Analysis as of

Cyber Attacks Algorithms

McDonnell Boehnen Hulbert & Berghoff LLP

AI News Roundup – Newest OpenAI model, AI technologies for military applications, AI-generated sports recaps, and more

To help you stay on top of the latest news, our AI practice group has compiled a roundup of the developments we are following....more

Jones Day

Anticipating Artificial Insurer Defenses: Maximizing Insurance Coverage for AI Exposures

Jones Day on

The Situation: The global market for artificial intelligence ("AI") technologies is projected to surpass $1 trillion by 2030....more

Clark Hill PLC

Right To Know - June 2024, Vol. 18

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Carlton Fields

HHS Warns Health Care Sector of AI-Driven Phishing, Social Engineering Attacks on IT Help Desks

Carlton Fields on

The Department of Health and Human Services recently issued a health sector alert through the Health Sector Cybersecurity Coordination Center (HC3)....more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles | Episode X | Biometrics - the Ticket to Flying High or a Turbulent Ride for Authentication?

Feeling seen, but maybe too seen - Stepping off the plane this past August after a long international flight, the last thing I wanted was a lengthy wait at US Customs, the final sentinel between me and a good night’s sleep. I...more

BCLP

Is your company approaching AI intelligently?

BCLP on

While new forms of artificial intelligence and machine-learning systems, or AI, have garnered headlines in the mainstream press, many companies are evaluating its use in their businesses. Perhaps to a greater extent than with...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Eversheds Sutherland (US) LLP

Getting ready for quantum computing: Managing the quantum threat

​​​​​​​Experts estimate that within the next decade or so, adversaries will have the capacity to use quantum computing to break the encryption on virtually all existing digital databases. This is why it is highly significant...more

Williams Mullen

Four Key Developments in Data, Data Protection and Cybersecurity Law

Williams Mullen on

The month of March has seen significant developments in the cybersecurity and data protection space. Here are four key legal developments that could be critical to your business. . . ...more

Jones Day

JONES DAY PRESENTS®: AI: Security and Privacy Risks with Big Data

Jones Day on

Emerging technology and evolving legal principles collide as artificial intelligence raises more questions than it answers. Privacy, consent/disclosure, repurposing, facial recognition and automated phishing attacks are some...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide