News & Analysis as of

Cybersecurity Data Security Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
BakerHostetler

[Podcast] 2025 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2025 Data Security Incident Response Report, which features insights and metrics from more than 1,250 incidents in 2024. This episode dives deeper into the data, including network...more

Foley & Lardner LLP

HIPAA Risk Analyses for Digital Health: Navigating AI, M&A and Vendor Diligence

Foley & Lardner LLP on

Share on Twitter Share by Email Share Back to top HIPAA Security Risk Analyses (SRAs) should be the foundation of every digital health company’s cybersecurity compliance. Far more than a checkbox exercise, a comprehensive SRA...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Sheppard Mullin Richter & Hampton LLP

North Dakota Passes New Data Security Law for “Financial Corporations”

North Dakota recently passed a law establishing new rules for certain financial companies operating in the state – specifically “financial corporations.” The new obligations will take effect on August 1, 2025. They will apply...more

Orrick, Herrington & Sutcliffe LLP

Financial services industry trade groups pen letter to Treasury Secretary Bessent on cybersecurity risks

On June 9, multiple financial services trade associations sent a letter to Treasury Secretary Scott Bessent expressing concerns about cybersecurity risk management practices at federal regulatory agencies following the OCC’s...more

Reveal

How to Navigate FedRAMP Compliance for eDiscovery in Federal Agencies

Reveal on

96% of companies currently use the public cloud, but Gartner predicts that there's more to that reliance than a convenient source of digital storage. Their leading experts believe that the cloud will be a business necessity...more

Alston & Bird

Trump Administration Releases Cyber Executive Order Revealing Renewed Strategy for U.S. Cybersecurity

Alston & Bird on

On June 6, 2025, President Trump issued an Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity, amending certain prior directives established by the Biden and Obama administrations....more

JD Supra Perspectives

Doing Work in Public Spaces: Confidentiality Lessons from Airplanes, Trains & Beyond

JD Supra Perspectives on

Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Morrison & Foerster LLP

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones

Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Thomas Fox - Compliance Evangelist

Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder

Innovation comes in many areas and compliance professionals need to not only be ready for it but embrace it. Join Tom Fox, the Voice of Compliance as he visits with top innovative minds, thinkers and creators in the...more

Schwabe, Williamson & Wyatt PC

Agencies Release Actionable Guidance on Play Ransomware

The United States Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have issued an...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

A&O Shearman

US, Australian, New Zealand and UK cybersecurity agencies publish guidance on best practices for securing data used to train and...

A&O Shearman on

On May 22 2025, the cybersecurity agencies from the US, UK, Australia, and New Zealand published a Cybersecurity Information Sheet (CIS) on ensuring that data used to train and use artificial intelligence (AI) and machine...more

Robinson+Cole Data Privacy + Security Insider

Adidas and UChicago Sued Over Data Breaches Caused by Third-Party Vendors

What do a global sportswear giant and a prestigious medical center have in common? Apparently, a shared struggle defending data breach lawsuits for breaches of sensitive personal information caused by third-party vendors....more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

Accelerynt, Inc.

Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration

Accelerynt, Inc. on

The Posture Visibility Problem - CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such as publicly accessible storage, unencrypted assets, and overly permissive...more

HaystackID

Click. Notify. Exfiltrate. Why the Most Damaging Threats Start in Your Inbox

HaystackID on

Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Venable LLP

A Closer Look at the Data Security Requirements in DOJ's Bulk Data Rule

Venable LLP on

As described in an earlier alert, the Department of Justice (DOJ) recently announced a 90-day pause in enforcement of the "Bulk Data Rule" for entities engaging in good faith compliance. That 90-day grace period ends on July...more

Ward and Smith, P.A.

Cyber Liability Insurance: Is It Worth It?

Ward and Smith, P.A. on

In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

766 Results
 / 
View per page
Page: of 31

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide