News & Analysis as of

Cyber Threats Regulatory Requirements

Davis Wright Tremaine LLP

Congress Extends CISA 2015 Through September 2026

Congress has renewed the Cybersecurity Information Sharing Act of 2015 (CISA 2015) until September 30, 2026, as part of the spending bill signed by the president yesterday, February 3, 2026. The renewal comes as welcome news...more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

White & Case LLP

New frontiers: How AI is transforming the life sciences industry - Patient, Commercial And Regulatory Concerns

White & Case LLP on

While the implementation of AI is growing apace, obstacles to deeper adoption still remain. These pressure points are consistent across subsectors: protecting sensitive data; integrating tools with legacy systems; clarifying...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 7, Issue 1, 2026

Welcome to our first issue of 2026 of Decoded -- our technology law insights e-newsletter. As we embark on our seventh year of publishing Decoded, we hope you have found the content interesting and insightful. 2026...more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 84: Grappling With Cyber Risk, Now and in a Post-Quantum World

Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers. The conversation explores the growing sophistication of...more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

White & Case LLP

Privacy and Cybersecurity 2025–2026: Insights, challenges, and trends ahead

White & Case LLP on

As organizations across the country adapt to an ever-changing digital environment, 2025 brought a wave of important updates in data privacy and cybersecurity at both the federal and state levels. New and amended state laws,...more

Mitratech Holdings, Inc

[Webinar] Future-Proofing Your Operational Resilience in Europe with Continuity Planning - January 22nd, 3:00 pm - 4:00 pm CET

European organizations are facing growing operational risks—from cyber threats and regulatory change to supply-chain instability and climate-related disruptions. New regulations such as DORA, NIS2, and the UK Operational...more

Morgan Lewis

Understanding the Cybersecurity Risks Flooding the Water and Wastewater Systems Sector

Morgan Lewis on

US critical infrastructure has historically been a prime target for threat actors due to the significant and far-reaching consequences of cyberattacks. Today, ongoing geopolitical tensions and escalating global conflict have...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Ropes & Gray LLP

On the Fourth Day of Data… All is Calm, All is Bright? Securing Agentic AI Before the Lights Go Out

Ropes & Gray LLP on

As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more

Shumaker, Loop & Kendrick, LLP

"When Artificial Intelligence Becomes the Hacker: Legal Risks and Compliance Strategies for Autonomous Cyber Threats"

In mid‑September 2025, Anthropic's Threat Intelligence team reported detecting and disrupting what it assesses as the first large-scale cyber-espionage campaign orchestrated primarily by an Artificial Intelligence (AI)...more

Mayer Brown

We Have Been Hacked: Now What? Lessons for the Boardroom

Mayer Brown on

The almost daily prevalence of cyber-attacks has brought the issue of cybersecurity as a core governance responsibility to the front of mind of company boards. In 2024 alone, over 15 million cyberattacks were recorded...more

Mayer Brown

Securing the Final Frontier: Cybersecurity Risk, Regulation, and Compliance Trends in Space and Satellite Operations

Mayer Brown on

Space and satellite systems underpin a wide range of critical functions, including global communications, navigation, scientific research, defense operations, and essential infrastructure services. As both government and...more

McDermott Will & Schulte

Key takeaways | AI Governance and Security Assessment Workshop

McDermott Will & Schulte on

During the AI Governance and Security Assessment Workshop, Shawn Helms and Jason Krieser of McDermott Will & Schulte and Patrick Murphy of Palo Alto Networks Unit 42, discussed ways to govern the use of generative artificial...more

Constangy, Brooks, Smith & Prophete, LLP

Hit with a cyberattack? What you do in the first 72 hours could save your business

When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 123

Jones Day on

This update (No. 123 | 8 October 2025) covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber...more

Wiley Rein LLP

Wiley’s Cyber Risks and Insurance 2026 Forecast

Wiley Rein LLP on

As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s Cyber Insurance team is already making predictions for 2026. Q: With the increase in the use of generative AI, how have the...more

Mandelbaum Barrett PC

High-Risk, High-Value: Cybersecurity and Legal Protection in the Cannabis Industry

Mandelbaum Barrett PC on

Introduction: A Perfect Storm for Cyber Risk - The legal cannabis and hemp industries has become one of the most data-rich, compliance-heavy, and rapidly digitizing sectors in the U.S. Growers, distributors, and...more

White & Case LLP

Reform to the UK’s cybersecurity regime incoming

White & Case LLP on

On 12 November 2025, the Department for Science, Innovation and Technology introduced the UK Cyber Security and Resilience (Network and Information Systems) Bill (the "Bill") to Parliament. Purpose of the Bill - A key...more

Hogan Lovells

The UK’s Proposed Cyber Security and Resilience Bill

Hogan Lovells on

On 12 November 2025 the UK Government introduced its highly anticipated Cyber Security and Resilience (Network and Information Systems) Bill (the “Bill”) to Parliament. The Bill is the first major overhaul of cybersecurity...more

Mayer Brown

Cyber Security and Resilience (Network and Information Systems) Bill introduced to Parliament

Mayer Brown on

The United Kingdom's government introduced the Cyber Security and Resilience (Network and Information Systems) Bill (the "Bill") to Parliament on 12 November 2025. The Bill is designed to update and strengthen the existing...more

Perkins Coie

President Trump Approves Short-Term Renewal of CISA 2015

Perkins Coie on

Congress included in the appropriations bill of November 12, 2025, an extension of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), 6 U.S.C. §§ 1501–10, through January 30, 2026....more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity Awareness Month: Protecting people, data, business integrity

October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more

HaystackID

[Webinar] Building Elite Cyber Incident Response Capabilities at Scale - October 29th, 11:00 am CDT

HaystackID on

As cybersecurity threats grow in frequency and sophistication, the ability to respond quickly, precisely, and at scale has become mission-critical for organizations worldwide. When hackers breach your systems, the clock...more

74 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide