News & Analysis as of

Cybersecurity

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
A&O Shearman

Hong Kong passes its first Cybersecurity Law to safeguard critical infrastructure

A&O Shearman on

Hong Kong’s Legislative Council passed the Protection of Critical Infrastructures (Computer Systems) Bill (the “CI Bill”) on March 19, 2025. This landmark legislation aims to enhance cybersecurity and minimize disruptions...more

Warner Norcross + Judd

Emphasizing Robust Contracts with Cloud Providers Amid Recent Alleged Breach at Oracle

Warner Norcross + Judd on

Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more

Akin Gump Strauss Hauer & Feld LLP

Preserving and Protecting the Integrity of American Elections (Trump EO Tracker)

Enforce the Federal prohibition on foreign nationals voting in Federal elections. Requires documentary proof of United States citizenship and for verification from a State or local official for national mail voter...more

Wiley Rein LLP

Trump EO on Preparedness and Resilience Could Signal Major Shifts in Federal Role

Wiley Rein LLP on

On March 19, 2025, the White House released Executive Order (EO) 14239, Achieving Efficiency Through State and Local Preparedness, which calls for a comprehensive review of and changes to many long-standing federal...more

J.S. Held

2025 J.S. Held Global Risk Report: Managing Cyber Risk

J.S. Held on

Cyber incidents such as the 2024 event involving Change Healthcare, which compromised the personal information of over 100 million people, highlight the evolving nature of cyber threats – increasingly becoming risk management...more

Wiley Rein LLP

DOD Mandates Use of Software Acquisition Pathway for Software Development Procurements

Wiley Rein LLP on

WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more

Gardner Law

Why Compliance Audits Are Non-Negotiable

Gardner Law on

In today’s heightened enforcement environment, compliance auditing isn’t just a best practice—it’s a necessity. Federal and state laws and industry guidance, including the Office of Inspector General (OIG) Compliance Program...more

Mayer Brown

Europe Daily News, 19 March 2025

Mayer Brown on

COMPETITION - Judgment of the Court of 19 March 2025 in Case T-142/23, Ivo Swenters Vs. European Commission Re: Competition - Agreements, decisions and concerted practices - Abuse of a dominant position - Market for the...more

Hinckley Allen

Enforcement Outlook Under the Second Trump Administration: How Trump’s Priorities Will Impact White-Collar Enforcement Actions

Hinckley Allen on

With every change in administration, organizations and individuals face changes in the types of conduct the federal government focuses on in its investigations, enforcement, and criminal prosecutions. ...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Hogan Lovells

Fortifying the Future: Hong Kong’s new cybersecurity laws to protect critical infrastructure

Hogan Lovells on

On 19 March 2025, the Legislative Council (the “LegCo”) passed the Protection of Critical Infrastructure (Computer System) Bill (the “Bill”), which is due to come into effect on 1 January 2026. This is a significant step in...more

Arnall Golden Gregory LLP

Healthcare Authority Newsletter - March 2025 #3

News Briefs - Congress Extends Telehealth Flexibilities for Another Six Months - Pandemic-related telehealth flexibilities set to expire March 31 have recently been extended for another six months as federal lawmakers approve...more

DLA Piper

China Released New Measures for Labelling AI-Generated and Synthetic Content

DLA Piper on

On 14 March 2025, the Measures for the Labelling of Artificial Intelligence-Generated and Synthetic Content (Measures) was jointly released by four Chinese government agencies, namely the Cyberspace Administration of China,...more

Quarles & Brady LLP

Warning! ChatGPT Exploit Used by Threat Actors in Cyber Attacks

Quarles & Brady LLP on

Members of the health care and financial industries, along with other industries that hold sensitive data, are warned that a ChatGPT vulnerability is being actively exploited by threat actors to attack security flaws in AI...more

Constangy, Brooks, Smith & Prophete, LLP

What personal data are you unknowingly hoarding?

With the number of data breaches increasing each year, it’s becoming more important to know what personal data you have and where you have it. On personal or even work devices, you may be surprised at how much of your data is...more

Morgan Lewis

Powering the Digital Future: The Rise of Data Centers in the Middle East

Morgan Lewis on

The Middle East is experiencing a transformative surge in its data center industry, driven by digital transformation, the widespread adoption of cloud services, and strategic investments in artificial intelligence (AI). The...more

Orrick, Herrington & Sutcliffe LLP

CPPA announces new executive director

On March 14, the California Privacy Protection Agency (CPPA) Board announced it appointed Tom Kemp as the CPPA’s executive director, effective April 1. Kemp enters the CPPA with experience as a policy advisor, cybersecurity...more

BakerHostetler

Weekly Blockchain Blog - March 2025 #4

BakerHostetler on

Digital Asset Companies Announce Strategic Acquisitions - According to a recent press release, a major U.S. cryptocurrency exchange has entered into an agreement to acquire NinjaTrader, a U.S. retail futures trading...more

Morrison & Foerster LLP

2024 State AGs Year in Review

In 2024, state attorneys general (State AGs) focused on a broad variety of areas and industries including, in particular, emerging industries such as artificial intelligence (AI) and privacy and social media protections....more

Jackson Lewis P.C.

Health Fitness, OCR’s Risk Analysis Initiative, and the ERISA Fiduciary Duty to Select Plan Service Providers

Jackson Lewis P.C. on

On Friday, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced the fifth enforcement action under its Risk Analysis Initiative. In this case, OCR reached a settlement with Health...more

Smith Anderson

Healthcare Cyberattacks Are on the Rise: Steps to Safeguard Your Organization

Smith Anderson on

Cyberattacks remain one of the most serious threats facing the healthcare industry. Healthcare providers and their vendors handle sensitive and valuable health data, making them prime targets for cybercriminals....more

Robinson+Cole Data Privacy + Security Insider

AI Governance: The Problem of Shadow AI

If you hang out with CISOs like I do, shadow IT has always been a difficult problem. Shadow IT refers to refers to “information technology (IT) systems deployed by departments other than the central IT department, to bypass...more

Robinson+Cole Data Privacy + Security Insider

Joint Alert Warns of Medusa Ransomware

On March 12, 2025, a joint cybersecurity advisory was issued by the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center to advise...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #436 – Microsoft Warns of Crypto Wallet Scanning Malware StilachiRAT

A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more

Robinson+Cole Data Privacy + Security Insider

Insider Threats: Potential Signs and Security Tips

In recent news, New York’s Stram Center for Integrative Medicine reported a security incident involving an employee misusing a patient’s payment card information. According to a breach report filed with the U.S. Department of...more

20,893 Results
 / 
View per page
Page: of 836

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide