News & Analysis as of

Cybersecurity Risk Management China

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Womble Bond Dickinson

More States Ban Foreign AI Tools on Government Devices

Womble Bond Dickinson on

Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more

Alston & Bird

FCC Announces New National Security Unit Focusing on State-Sponsored Cyber Threats

Alston & Bird on

On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more

Cozen O'Connor

AGs Urge Congress to Ban DeepSeek AI from Government Devices

Cozen O'Connor on

A coalition of 21 Republican AGs, led by Montana AG Austin Knudsen, is urging Congress to pass the No DeepSeek on Government Devices Act, which would prohibit downloading and using DeepSeek’s AI software on government...more

Hogan Lovells

Navigating new horizons: China's personal information protection compliance audits

Hogan Lovells on

On February 14, 2025, the Cyberspace Administration of China ("CAC") finalized the "Personal Information Protection Compliance Audit Measures" ("Audit Measures"), which refines the draft version released on August 3, 2023...more

Wiley Rein LLP

[Podcast] The Impact of IoT Supply Chain Risks on Government Contracts

Wiley Rein LLP on

In this episode of Wiley’s Government Contracts podcast, partners Tracye Howard and Sara Baxenberg discuss the evolving national security concerns surrounding Internet of Things (IoT) modules produced by Chinese companies...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

Hogan Lovells

BIS seeks public comment on potential rule restricting the import and use of unmanned aircraft systems involving China, Russia and...

Hogan Lovells on

On January 3, 2025 the U.S. Department of Commerce’s Bureau of Industry and Security released an advanced notice of proposed rule-making seeking public input on the definition of “unmanned aircraft systems” and their...more

Akin Gump Strauss Hauer & Feld LLP

Former President Biden's Executive Order to Strengthen U.S. Cybersecurity and Consumer Trust

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts,...more

Holland & Knight LLP

Issues to Watch: Potential Impacts of the Trump Administration on Marine Terminal Operators

Holland & Knight LLP on

As we move into 2025 and the Trump Administration prepares to take control of the government, marine terminal operators are anxiously and optimistically awaiting resolution of the labor disputes between terminal operator...more

Morrison & Foerster LLP

Commerce Rings in New Year with Proposed Rulemaking on Drones

The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more

A&O Shearman

Unauthorized mapping activities in China's automobile industry

A&O Shearman on

On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more

A&O Shearman

Increasing insider threats and the importance of AI governance

A&O Shearman on

China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more

NAVEX

How CCOs Can Play a Role in Supply Chain Risk Management

NAVEX on

Look around the business landscape today, and supply-chain risks are everywhere –  which means that sooner or later, those risks will appear on the compliance function’s radar screen too. They probably already have....more

McDonnell Boehnen Hulbert & Berghoff LLP

AI News Roundup – Nobel Prize winners, Chinese AI companies target the U.S. market, Amazon’s AI-powered shopping assistance, and...

To help you stay on top of the latest news, our AI practice group has compiled a roundup of the developments we are following....more

Skadden, Arps, Slate, Meagher & Flom LLP

The Informed Board - Winter 2024

The oversight obligations of boards continue to expand. Recent enforcement actions and new laws in areas such as cybersecurity, artificial intelligence and supply chains create new challenges for boards, as we explain in this...more

J.S. Held

2024 J.S. Held Global Risk Report: New Laws Addressing the Risks and Rewards of Artificial Intelligence (AI)

J.S. Held on

The race to develop AI and calls to regulate it are heating up around the world. In November 2023, 28 countries, including the United States, United Kingdom, China, and the European Union, met and pledged to work together to...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

American Conference Institute (ACI)

[Event] U.S. Export & Re-export Compliance for Canadian Operations - January 24th - 25th, Mississauga, ON, Canada

We are pleased to announce that the 13th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations is returning to Toronto on January 24–25, 2024! As the only comprehensive, practical event of its kind in...more

WilmerHale

Defense Contractors Will Face Higher Risks as Spending Increases

WilmerHale on

Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more

Robinson+Cole Data Privacy + Security Insider

CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors

The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored...more

Braumiller Law Group, PLLC

Hot Topics in International Trade - October 2022 - OFAC Reissues Cyber-Related Sanctions Regulations

An inherent aspect of any new technology is that it doesn’t take long for bad actors to figure out how it can be weaponized for nefarious purposes. Cyber-related technologies represent an increasingly dangerous area of risk...more

Robinson+Cole Data Privacy + Security Insider

NIST Releases Guidance on Supply Chain Security

The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more

Robinson+Cole Data Privacy + Security Insider

Chinese APT41 Attacking State Networks

Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber threat activity through APT41, which has been linked to China’s...more

Robinson+Cole Data Privacy + Security Insider

China-Based Ransomware Operator Exploiting Log4j Vulnerability

Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more

Wiley Rein LLP

What Government Contractors Need to Know About the Fiscal Year 2022 NDAA

Wiley Rein LLP on

On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide