News & Analysis as of

Cybersecurity Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

Hogan Lovells

PRODUCT | Cybersecurity and Product Liability in Technology – Cross perspectives

Hogan Lovells on

As our world has grown more connected and digitalized, and as smart, data-driven devices — including those that form the Internet of Things (IoT) — have become more prevalent, regulators have begun to reframe how they address...more

PilieroMazza PLLC

SWIFT to Launch May 1: DOD Fast Tracks Software Deployment Opening New Doors for Defense Contractors

PilieroMazza PLLC on

In a decisive move to stay ahead in an era of rapidly evolving digital threats, the Department of Defense (DOD) is accelerating its push for software modernization. The upcoming launch of the Software Fast Track (SWIFT)...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

Fisher Phillips

Data Security and International Travel: What K–12 Schools and Trip Chaperones Need to Know

Fisher Phillips on

As global learning experiences become more common in K–12 education, schools increasingly send staff and students abroad for cultural exchanges, academic competitions, service trips, and more. While these trips offer...more

J.S. Held

Top Ten Strategic Advantages of a vCISO with AI Expertise for Developing Business and Protecting AI Applications

J.S. Held on

In today’s fast-paced digital landscape, Artificial Intelligence (AI) is reshaping industries, unlocking new efficiencies, and enabling transformative business models. Companies leveraging AI to create applications or enhance...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Accelerynt, Inc.

Trapped in the Vendor Web: When More Vendors Can Mean Less Security

Accelerynt, Inc. on

More vendors were supposed to mean more protection. The thinking was simple: pick the best in every category—endpoint, identity, SIEM, automation—and assemble a flexible, layered defense. But over time, that flexibility...more

A&O Shearman

Operational resilience in banking: from regulatory compliance to strategic priority

A&O Shearman on

As regulatory frameworks tighten and cybersecurity threats grow in complexity, operational resilience is, now more than ever, a boardroom challenge for banks....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #441 – Identity Theft Statistics Increasing in 2025

Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

Husch Blackwell LLP

Effective Dates Draw Near for Insurance Industry to Comply with NYDFS's Cybersecurity Rules

Husch Blackwell LLP on

As part of a multiyear rollout, the New York Department of Financial Services (NYDFS) has established May 1, 2025, and November 1, 2025, as effective dates for certain amendments to its cybersecurity regulations. These...more

Mitratech Holdings, Inc

The Crucial Role of Business Impact Analysis (BIA) in Cyber Resilience

Cyber threats aren’t a distant possibility — they’re a daily reality. And according to IBM’s Cost of a Data Breach Report, they’re costing businesses more than ever. The global average data breach cost has surged to $4.88...more

A&O Shearman

FSB publishes finalised format for FIRE framework

A&O Shearman on

The Financial Stability Board (FSB) has published its finalised Format for Incident Reporting Exchange (FIRE), together with a press release and updated webpage. FIRE provides a standardised format for financial institutions...more

McDermott Will & Emery

Privacy Framework 1.1 Gets a Tune-Up in NIST’s Latest Draft Update

McDermott Will & Emery on

On April 14, 2025, the National Institute of Standards and Technology (NIST) released a draft update to the NIST Privacy Framework 1.1. The updates are meant to enhance organizations’ data governance and risk management and...more

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Clark Hill PLC

Clark Hill 2025 Commercial Real Estate Outlook: The Number One Cybersecurity Threat Facing the Real Estate Sector

Clark Hill PLC on

When we talk to clients about cybersecurity, it tends to conjure up images of ransomware, systems that are encrypted and inaccessible, and stolen data. For the real estate sector, ransomware isn’t the largest cybersecurity...more

Jackson Lewis P.C.

Florida Bar Urges Law Firms to Adopt Incident Response Plans: A Call to Action for Legal Professionals

Jackson Lewis P.C. on

In late March 2025, the Florida Bar Board of Governors unanimously endorsed the recommendation of its Special Committee on Cybersecurity and Privacy Law that law firms should adopt written incident response plans (IRPs) to...more

BakerHostetler

[Podcast] Slings and Arrows: Trade Secret Trends Reflect a Need for Safeguards

BakerHostetler on

Consider trade secret enforcement your armor on the battlefields of IP. Given greater exposure to cybersecurity breaches and data theft, a murky future for employee noncompete agreements, AI algorithms that challenge the...more

Cozen O'Connor

Cybersecurity Best Practices for AI-Powered Robotics Under State and Federal Privacy Laws

Cozen O'Connor on

As robotics technology rapidly advances in connection with the use of artificial intelligence (AI), the collection, processing, and storage of personal information—including biometric data—will become increasingly common....more

Orrick, Herrington & Sutcliffe LLP

OCC provides an update on its security breach given institutional risk

On April 14, the OCC released a letter providing more details on the recent security breach involving its email systems. The breach — identified as a major incident under the Federal Information Security Modernization Act...more

Davis Wright Tremaine LLP

FedRAMP 20x Initiative Promises Major Changes for Federal Cloud Service Providers

Major changes are coming again to the Federal Risk and Authorization Management Program ("FedRAMP"), the federal government's cybersecurity authorization program for cloud service providers ("CSPs")....more

Alston & Bird

Cybersecurity Controls: What Do Regulators Expect Nowadays?

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team highlights the increasingly specific cybersecurity controls identified by regulators, explains why these enhanced cybersecurity controls have become the focus of regulators, and shares...more

Woods Rogers

Heightened U.S. Border Scrutiny Poses Increased Digital Privacy Risk for Entrants to U.S.

Woods Rogers on

Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more

A&O Shearman

UK Financial Stability in Focus report: AI in the financial system

A&O Shearman on

The Financial Policy Committee (FPC) of the Bank of England (BoE) has published the Financial Stability in Focus report on AI in the UK financial system. The FPC considers the potential benefits of AI with its growing...more

2,920 Results
 / 
View per page
Page: of 117

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide