News & Analysis as of

Cybersecurity Intellectual Property Protection Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
J.S. Held

Top Ten Strategic Advantages of a vCISO with AI Expertise for Developing Business and Protecting AI Applications

J.S. Held on

In today’s fast-paced digital landscape, Artificial Intelligence (AI) is reshaping industries, unlocking new efficiencies, and enabling transformative business models. Companies leveraging AI to create applications or enhance...more

BakerHostetler

[Podcast] Slings and Arrows: Trade Secret Trends Reflect a Need for Safeguards

BakerHostetler on

Consider trade secret enforcement your armor on the battlefields of IP. Given greater exposure to cybersecurity breaches and data theft, a murky future for employee noncompete agreements, AI algorithms that challenge the...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Holland & Knight LLP

Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence

Holland & Knight LLP on

In the 20th episode of "Are We All Clear? Facilitating Security Clearances," host Molly O'Casey is joined by John Metz, a product manager at Agile Defense, and Antonia Tzinova, the head of Holland & Knight's CFIUS and...more

Levenfeld Pearlstein, LLC

7 Things Businesses Should Consider When Using AI

Artificial intelligence (AI), machine learning algorithms, and other emerging technologies impact nearly every business and industry. The rapid deployment of Generative AI (GenAI) is reshaping how organizations do business...more

Wiley Rein LLP

DOD Mandates Use of Software Acquisition Pathway for Software Development Procurements

Wiley Rein LLP on

WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 1

Ankura on

Generative artificial intelligence (AI) is transforming how businesses operate, from content creation to decision-making and even legal and compliance analysis. The use of machines to perform core deliberative and inventive...more

HaystackID

Jaguar Land Rover Breach Highlights Growing Cybersecurity Risks in Automotive Sector

HaystackID on

A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Harris Beach Murtha PLLC

Generative AI Browser Extensions and Plug-ins: A Security and Privacy Challenge

Generative AI is incredibly popular. So popular that many GenAI tools now have browser extensions that work across all open pages of the browsers upon which they are installed. They helpfully summarize pages, highlight...more

J.S. Held

2025 J.S. Held Global Risk Report: Artificial Intelligence, Data & Digital Regulations

J.S. Held on

Artificial Intelligence (AI) has been touted as the answer to a multitude of business challenges. However, AI – along with machine learning and large language models (LLMs) – is still fraught with technical and regulatory...more

Littler

Considerations for Artificial Intelligence Policies in the Workplace

Littler on

In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more

Warner Norcross + Judd

Is Your Company’s Insurance Ready for AI Challenges?

Artificial intelligence (AI) is attracting widespread attention due to its significant potential to transform how businesses operate. However, new technology also brings the risk of potential harm due to unforeseen defects,...more

Sheppard Mullin Richter & Hampton LLP

M&A Playbook for Acquiring AI-Powered Companies

As artificial intelligence (AI) continues to transform the business world, acquirors need to prepare for a deep dive when evaluating companies that use AI to enable their businesses or create proprietary AI. Key...more

Zelle  LLP

Employee Theft of Electronic Data Is Not Direct Physical Damage to or Direct Physical Loss of Business Personal Property

Zelle LLP on

In Site Jab v. Hiscox Insurance Company, Inc., United States District Judge Lee H. Rosenthal recently tackled whether a business owner’s insurance policy provided coverage for theft of information, including confidential...more

Kilpatrick

5 Key Takeaways | Managing the Risks in Using Generative AI or How I Learned to Stop Worrying and Love AI

Kilpatrick on

Kilpatrick's Steve Borgman and Jordan Glassman recently presented on the various generative AI technologies available, with an emphasis on large language models such as ChatGPT (and others that are similar), at Kilpatrick’s...more

Venable LLP

Understanding Trade Secret Laws and Assets

Venable LLP on

For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more

Morris, Manning & Martin, LLP

Navigating AI Risks: Balancing Innovation and Compliance in Your Enterprise

As artificial intelligence continues to revolutionize industries, businesses are facing increasing pressure to integrate AI solutions into their products and services to remain competitive. However, the adoption of AI...more

The Volkov Law Group

Embracing Generative AI — The Current Risk Profile (Part II of II)

The Volkov Law Group on

When evaluating AI risks, legal, ethics and compliance professionals need to divide the question into two — first, what are risks from legal, ethics and compliance internal use of AI? and second, what are business risks from...more

K&L Gates LLP

Be Wary: Sophisticated Scam Emails Impersonating IP Attorneys

K&L Gates LLP on

Business owners should be aware of a new email scam circulating impersonating an intellectual property (IP) representative, containing false information, and offering trademark assistance. This nefarious email scam is sent by...more

Fish & Richardson

Protecting and Enforcing Your Trade Secrets in a Global Economy

Fish & Richardson on

In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more

Saul Ewing LLP

Best Practices for Mitigating Intellectual Property Risks in Generative AI Use

Saul Ewing LLP on

Generative AI (GenAI) is transforming the business landscape, unlocking new possibilities for innovation, productivity, and efficiency. As with any major shift, GenAI comes with its own risks, particularly in intellectual...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

50 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide