News & Analysis as of

Cyber Attacks Risk Assessment National Security

StoneTurn

2025 and Cybersecurity: What is Your Strategy?

StoneTurn on

Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

Latham & Watkins LLP

Biden’s Cyber Executive Order: How It Could Impact Your Business

Latham & Watkins LLP on

President Biden signed an executive order to bolster the federal government’s cybersecurity posture on May 12. The order focuses on implementing vital improvements to networks of federal departments and agencies, many of...more

Vinson & Elkins LLP

DHS Pipes Up: Issues Directive On Enhancing Pipeline Cybersecurity

Vinson & Elkins LLP on

On May 27, 2021, against the backdrop of the Colonial Pipeline cybersecurity incident, the Department of Homeland Security’s Transportation Security Administration (“TSA”) announced Security Directive Pipeline-2021-01...more

Akin Gump Strauss Hauer & Feld LLP

Six Recent Government Supply Chain Risk and Cybersecurity Initiatives

• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more

Snell & Wilmer

Cybersecurity on Your Project: Why Not Follow National Security Strategy?

Snell & Wilmer on

In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more

Thomas Fox - Compliance Evangelist

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide