News & Analysis as of

Cybersecurity Today's Popular Updates

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Falcon Rappaport & Berkman LLP

Navigating the Patchwork of State Consumer Privacy Statutes: An E-Commerce Compliance Playbook

Online retailers now face an increasingly complex matrix of state consumer-privacy statutes that impose prescriptive requirements on data collection, monetization, and cybersecurity practices. ...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Proskauer - Regulatory & Compliance

SEC Formally Withdraws Fourteen Rule Proposals

On June 12, 2025 the Securities and Exchange Commission (“SEC”) formally withdrew fourteen outstanding rule proposals issued by the prior administration. Although most observers doubted that the current Commission would adopt...more

A&O Shearman

Trump White House issues executive order on cybersecurity

A&O Shearman on

While the Order preserves significant portions of President Biden’s most recent cyber executive order—including provisions aimed at securing the software supply chain, federal government systems, and federal...more

Mintz - Antitrust Viewpoints

Trump Signs EO on AI Cybersecurity and Senate Floats New Approach to State AI Moratorium - AI: The Washington Report

On June 6, President Trump issued an Executive Order on cybersecurity to manage AI software vulnerabilities and compromises in the federal government. The EO also directs various agencies to share their datasets for cyber...more

Wiley Rein LLP

President Trump’s Cyber Mandate: Analysis of Executive Order on Strengthening U.S. Cybersecurity

Wiley Rein LLP on

President Trump issued a cybersecurity Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity” (Trump EO), along with a corresponding Fact Sheet on June 6, 2025. The Trump EO clears some of the...more

Fisher Phillips

Congress Considers AI Whistleblower Law: What Employers Need to Know Now

Fisher Phillips on

A bipartisan bill pending before Congress would make it illegal to retaliate against employees who speak up about AI-related risks. Senators from both sides of the aisle introduced the AI Whistleblower Protection Act (S....more

Morrison & Foerster LLP

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones

Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more

HaystackID

AT&T Customer Data Resurfaces on Dark Web in Enhanced, Decrypted Format

HaystackID on

According to an AT&T spokesperson, this is not accurate. Social Security Numbers and Dates of Birth were already available in plain text in the original compromised dataset from 2024 (in separate files that could be...more

Jenner & Block

Client Alert: White House Narrows and Refocuses Biden Executive Order on Strengthening Federal Cybersecurity

Jenner & Block on

On June 6, 2025, President Donald J. Trump signed a new executive order on “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (“Trump Cyber EO”),...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

PilieroMazza PLLC

Managing Litigation Risk During the Business Lifecycle, Part 4: M&A Transactions with Government Contractors

PilieroMazza PLLC on

Transactions that involve government contracts carry a unique set of challenges. Unlike a typical merger or acquisition, deals involving government contracts require the navigation of a complex web of federal laws,...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Hogan Lovells

Australia’s Model Clauses provide framework for AI procurement

Hogan Lovells on

On 17 March 2025, the Australian Government published Model Clauses to help government purchasers manage vendor relationships when procuring AI technology based systems and services. The Model Clauses cover issues relevant to...more

Holland & Hart LLP

A Defense Contractor's Guide to CMMC, DFARS, and FAR Requirements

Holland & Hart LLP on

Cyber-attacks against America’s defense industrial base are becoming more sophisticated and more frequent. To reduce the risk of sensitive national security information landing in the hands of bad actors, the Department of...more

Ropes & Gray LLP

Glow Up or Sell Out? Opportunities and Risks in the Consumer Health and Beauty Sector

Ropes & Gray LLP on

The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more

Dacheng

China Monthly Data Protection Update: May 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more

Hogan Lovells

Hogan Lovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025

Hogan Lovells on

The rapid development of data protection laws across the Asia-Pacific region indicates significant movement toward certain standards, albeit with notable local policy variations across multiple areas. Our Asia-Pacific Data,...more

KPMG Board Leadership Center (BLC)

Midyear observations on the 2025 board agenda

Disruption, volatility, and uncertainty aren’t new operating conditions by any means. But the assumptions that have long driven corporate thinking—the role of government, geopolitical norms, and consistency in US policies as...more

A&O Shearman

Cybersecurity in mining: protecting infrastructure and digital assets

A&O Shearman on

The mining sector is increasingly at risk from cyber attacks, and many companies are racing to defend themselves against the backdrop of a rapidly changing threat landscape. Ross Phillipson and Anna Rudawski explore what is...more

DLA Piper

Navigating The EU’s New Digital Regulatory Landscape: What Data Centre Operators and Investors Need to Know

DLA Piper on

The European Union has ushered in a new era of digital regulation that will significantly impact the data centre industry. With the introduction of the EU Artificial Intelligence Act, the new Network and Information Systems...more

Awatif Mohammad Shoqi Advocates & Legal...

Learn more about privacy violations and secret disclosure under the UAE.

In today's world, violations of individual privacy and secret disclosure are a serious problem. It may be eavesdropping, interception, recording, and the spreading of personal information without the consent of the other...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

6,683 Results
 / 
View per page
Page: of 268

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide