News & Analysis as of

Cyber Threats Data Protection

White & Case LLP

New frontiers: How AI is transforming the life sciences industry - Patient, Commercial And Regulatory Concerns

White & Case LLP on

While the implementation of AI is growing apace, obstacles to deeper adoption still remain. These pressure points are consistent across subsectors: protecting sensitive data; integrating tools with legacy systems; clarifying...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 7, Issue 1, 2026

Welcome to our first issue of 2026 of Decoded -- our technology law insights e-newsletter. As we embark on our seventh year of publishing Decoded, we hope you have found the content interesting and insightful. 2026...more

White & Case LLP

Privacy and Cybersecurity 2025–2026: Insights, challenges, and trends ahead

White & Case LLP on

As organizations across the country adapt to an ever-changing digital environment, 2025 brought a wave of important updates in data privacy and cybersecurity at both the federal and state levels. New and amended state laws,...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

Ropes & Gray LLP

On the Fourth Day of Data… All is Calm, All is Bright? Securing Agentic AI Before the Lights Go Out

Ropes & Gray LLP on

As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more

Offit Kurman

Cybersecurity Insights for the Sandwich Generation with Dan Krutoy

Offit Kurman on

In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more

Constangy, Brooks, Smith & Prophete, LLP

Hit with a cyberattack? What you do in the first 72 hours could save your business

When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden...more

StoneTurn

AI and LLMs in Corporate Cybersecurity: Choosing the Right Solution for Your Organization

StoneTurn on

This article examines how cybersecurity teams can leverage AI and LLM technologies like Microsoft Copilot and Open WebUI while managing associated security risks through proper logging and monitoring practices. It provides...more

Ankura

Quantum Computing: The Next Frontier in Cybersecurity Threats and Defenses

Ankura on

Let us get right to it. Quantum computing is not just another tech buzzword. It is a seismic shift in how we process information, and that shift has cybersecurity experts on edge. The big deal? Quantum computers — once they...more

Mandelbaum Barrett PC

High-Risk, High-Value: Cybersecurity and Legal Protection in the Cannabis Industry

Mandelbaum Barrett PC on

Introduction: A Perfect Storm for Cyber Risk - The legal cannabis and hemp industries has become one of the most data-rich, compliance-heavy, and rapidly digitizing sectors in the U.S. Growers, distributors, and...more

Lowenstein Sandler LLP

Anthropic Reports First Known AI-Orchestrated Cyber Espionage Campaign: Raising Stakes for Data Security

Lowenstein Sandler LLP on

On November 13, AI company Anthropic reported that its Threat Intelligence team had disrupted a state‑sponsored Chinese threat actor conducting what is believed to be the first largely autonomous AI‑orchestrated cyber...more

Perkins Coie

President Trump Approves Short-Term Renewal of CISA 2015

Perkins Coie on

Congress included in the appropriations bill of November 12, 2025, an extension of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), 6 U.S.C. §§ 1501–10, through January 30, 2026....more

Ropes & Gray LLP

U.S. Cybersecurity Sector Report - Q3 2025

Ropes & Gray LLP on

Q3 2025 is up +14% from last quarter, a sign that the market is becoming more active, driven by managed & IT services that help organizations to outsource their cybersecurity needs, which has become increasingly important as...more

Wiley Rein LLP

Fraud and Scam Prevention Series: Navigating Increasingly Sophisticated Cybersecurity Threat and Fraud Tactics

Wiley Rein LLP on

Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more

McCarter & English, LLP

Keeping the Lights On: Cybersecurity & Data Privacy Concerns in the Commercial Real Estate Industry

Cybersecurity and data privacy matters impact everything around us, including our physical space. Commercial real estate space represents a large part of every city across the globe, whether it is owned or leased. What would...more

Hogan Lovells

Provisions in Singapore’s Cybersecurity (Amendment) Act came into force on 31 October 2025

Hogan Lovells on

The Cybersecurity Act 2018 (the 2018 Act) established Singapore's statutory framework for the oversight and maintenance of national cybersecurity. Its key objectives were to protect critical information infrastructure (CII),...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity Awareness Month: Protecting people, data, business integrity

October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more

Fisher Phillips

New Cybercriminal Group Targeting Transportation and Logistics Industry – How to Protect Your Organization

Fisher Phillips on

A new cybercrime threat actor calling itself “Coinbase Cartel” has begun targeting transportation, logistics, and adjacent sectors – and you should act quickly to shore up your defenses. Their model is simple: they steal data...more

HaystackID

[Webinar] Building Elite Cyber Incident Response Capabilities at Scale - October 29th, 11:00 am CDT

HaystackID on

As cybersecurity threats grow in frequency and sophistication, the ability to respond quickly, precisely, and at scale has become mission-critical for organizations worldwide. When hackers breach your systems, the clock...more

Womble Bond Dickinson

Artificial Intelligence and Cyber Risk

Womble Bond Dickinson on

The power of AI is creating new and evolving cyber risks. This article explores those risks, the legal landscape and consequences for organizations in the UK and US that fail to implement sufficient cyber protections, and the...more

Constangy, Brooks, Smith & Prophete, LLP

When cyber threat sharing laws lapse: Legal risk in a government shutdown

The recent shutdown of the federal government has left many critical services in limbo, including the nation’s primary cybersecurity agency. Amid the ongoing budget standoff in Congress, funding for the Cybersecurity and...more

Morrison & Foerster LLP

[Webinar] CTRL+ALT+DEFEND: Insights on Emerging Threats and Best Practices for Cyber Risk Mitigation - October 29th, 1:00 pm ET

Morrison & Foerster LLP on

Join Kaylee Cox Bankston and Linda Clark for an engaging and informative webinar on October 29th exploring the most pressing cybersecurity topics of 2025 and beyond. This session will cover the latest threat landscapes,...more

Wiley Rein LLP

[Webinar] Cyber Insights: What’s Behind Evolving Cyber Policy and What Does It Mean for Your Organization? - October 21st, 12:30...

Wiley Rein LLP on

Since 2004, October has marked Cybersecurity Awareness Month and for more than 15 years Wiley’s team of cybersecurity, tech, and government contracts experts has been helping organizations manage cyber risk. On October 21, as...more

Venable LLP

Cyber Threat Information Sharing at Risk: What Companies Should Consider if the Cybersecurity Information Sharing Act of 2015 Is...

Venable LLP on

The Cybersecurity Information Sharing Act of 2015 (CISA 2015) is set to expire on September 30, alongside a potential government shutdown. (While an extension is included in the House-passed continuing resolution, that bill...more

Morrison & Foerster LLP

[Webinar] The Lawyer’s Field Guide to Cybersecurity Incidents - October 7th, 1:00 pm ET

When a cyber incident strikes, time is short and the stakes are high. Lawyers are often called upon to coordinate response efforts, ensure regulatory and contractual obligations are met, direct third party experts — all while...more

672 Results
 / 
View per page
Page: of 27

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide