News & Analysis as of

Cybersecurity National Security Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
PilieroMazza PLLC

SWIFT to Launch May 1: DOD Fast Tracks Software Deployment Opening New Doors for Defense Contractors

PilieroMazza PLLC on

In a decisive move to stay ahead in an era of rapidly evolving digital threats, the Department of Defense (DOD) is accelerating its push for software modernization. The upcoming launch of the Software Fast Track (SWIFT)...more

Womble Bond Dickinson

More States Ban Foreign AI Tools on Government Devices

Womble Bond Dickinson on

Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more

Carlton Fields

No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion

Carlton Fields on

On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #439 – Government Officials’ Venmo Accounts Publicly Accessible

Wired has reported that several government officials involved in the Signal chat exposing sensitive national security plans have also exposed their Venmo accounts by not adjusting their account privacy settings to prohibit...more

Holland & Knight LLP

Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence

Holland & Knight LLP on

In the 20th episode of "Are We All Clear? Facilitating Security Clearances," host Molly O'Casey is joined by John Metz, a product manager at Agile Defense, and Antonia Tzinova, the head of Holland & Knight's CFIUS and...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Latham & Watkins LLP

President Trump Issues Executive Order Calling on State and Local Governments to Support National Resilience

Latham & Watkins LLP on

The order prioritizes extensive policy reviews, the introduction of a National Resilience Strategy and National Risk Register, and increased reliance on state and local governments to strengthen national infrastructure....more

Robinson+Cole Data Privacy + Security Insider

Joint Bulletin Warns Health Sector of Potential Coordinated Multi-City Attack

On March 20, 2025, the American Hospital Association (AHA) and the Health-ISAC issued an alert to the health care sector warning of a social media post that posed a potential threat “related to the active planning of a...more

Wiley Rein LLP

Trump EO on Preparedness and Resilience Could Signal Major Shifts in Federal Role

Wiley Rein LLP on

On March 19, 2025, the White House released Executive Order (EO) 14239, Achieving Efficiency Through State and Local Preparedness, which calls for a comprehensive review of and changes to many long-standing federal...more

Wiley Rein LLP

DOD Mandates Use of Software Acquisition Pathway for Software Development Procurements

Wiley Rein LLP on

WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Alston & Bird

FCC Announces New National Security Unit Focusing on State-Sponsored Cyber Threats

Alston & Bird on

On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more

Cozen O'Connor

AGs Urge Congress to Ban DeepSeek AI from Government Devices

Cozen O'Connor on

A coalition of 21 Republican AGs, led by Montana AG Austin Knudsen, is urging Congress to pass the No DeepSeek on Government Devices Act, which would prohibit downloading and using DeepSeek’s AI software on government...more

Robinson+Cole Data Privacy + Security Insider

MS-ISAC Loses Funding and Cooperative Agreement with CIS

The Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Tuesday, March 11, 2025, that the Multi-State Information Sharing and Analysis Center (MS-ISAC) will lose its federal funding and cooperative agreement...more

Guidepost Solutions LLC

Understanding Drone Security: Navigating U.S. Airspace Regulations and Defense Strategies

As drones become increasingly integrated into recreational and professional activities, their presence in U.S. airspace has grown exponentially. These unmanned aerial systems (UAS) bring unparalleled opportunities,...more

StoneTurn

2025 and Cybersecurity: What is Your Strategy?

StoneTurn on

Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more

Womble Bond Dickinson

Cybersecurity in the Nuclear Industry: US and UK Regulation and the Sellafield Case

Womble Bond Dickinson on

This is the fifth article in Womble Bond Dickinson’s Energy & Natural Resources thought leadership series titled “Going Nuclear: A Sustainable Solution to Rising Energy Demand.” The series will explore the changing landscape...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

Sheppard Mullin Richter & Hampton LLP

Healthcare Security is Homeland Security: A Discussion with Jonathan Meyer

In an era where cyber threats are escalating, healthcare has emerged as a critical battleground for security. Its significance has become increasingly crucial as the intersection of healthcare, cybersecurity, and technology...more

Wiley Rein LLP

CISA 2015 Reauthorization – Are Changes on the Horizon?

Wiley Rein LLP on

As we noted in Federal Cybersecurity Policy in 2025: What to Watch in Changing Times, key parts of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), the United States’ foundational cybersecurity information...more

HaystackID

AI Playbook: UK Government’s Strategy for Responsible AI Adoption in the Public Sector

HaystackID on

The United Kingdom is taking a strategic approach to artificial intelligence (AI) adoption within its public sector to drive economic growth and improve public services. Central to this effort is the UK’s AI Playbook, a...more

Morris, Manning & Martin, LLP

New CMMC 2.0 Guidance Issued

The Department of Defense (DoD) recently issued a memo titled, "Implementing the Cybersecurity Maturity Model Certification (CMMC) Program: Guidance for Determining Appropriate CMMC Compliance Assessment Levels and Process...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Pillsbury Winthrop Shaw Pittman LLP

White House Seeks Public Input on AI Action Plan

The White House is gathering industry feedback on AI governance, giving stakeholders an opportunity to shape future policy....more

Akin Gump Strauss Hauer & Feld LLP

President Trump Changes National Security Council to Align with New Priorities

On January 20, 2025, President Trump signed the National Security Presidential Memorandum (NSPM-1), which lays out the framework for how the National Security Council (NSC) will be organized under his administration. The...more

113 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide