News & Analysis as of

Cybersecurity Supply Chain Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Alston & Bird

NSA, CISA, FBI, and International Partners Issue Joint Guidance on AI Data Security

Alston & Bird on

Artificial intelligence (AI) systems are vulnerable to more than just threat actors. Our Privacy, Cyber & Data Strategy Group examines joint guidance issued by U.S. and international cybersecurity agencies that provides best...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

McCarter & English Blog: Government Contracts...

The Need for Speed: DoD’s “Software Fast Track” Targets Bureaucracy at Mach 2

The Department of Defense (DoD) is revving its engines again—this time to rocket past its own software acquisition drag. Launched via an April 24 memo from Acting DoD CIO Katie Arrington, the DoD’s Software Fast Track (SWFT)...more

Mitratech Holdings, Inc

Why Business Continuity Planning Must Be Central to TPRM

Today, organizations are more reliant than ever on external vendors, suppliers, and service providers. This interdependency amplifies both operational capabilities and vulnerabilities. Disruptions at a critical third party...more

A&O Shearman

US, Australian, New Zealand and UK cybersecurity agencies publish guidance on best practices for securing data used to train and...

A&O Shearman on

On May 22 2025, the cybersecurity agencies from the US, UK, Australia, and New Zealand published a Cybersecurity Information Sheet (CIS) on ensuring that data used to train and use artificial intelligence (AI) and machine...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Hogan Lovells

Threat actors increasingly introducing malicious code into open source packages

Hogan Lovells on

The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more

Ropes & Gray LLP

Glow Up or Sell Out? Opportunities and Risks in the Consumer Health and Beauty Sector

Ropes & Gray LLP on

The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Mitratech Holdings, Inc

EU Cyber Resilience Act: How to Prepare Now

The EU Cyber Resilience Act (CRA), adopted by the European Parliament in 2024, marks a major milestone in European cybersecurity legislation. As the first EU-wide law focused on the cybersecurity of digital products, it...more

Skadden, Arps, Slate, Meagher & Flom LLP

Director Judy Bruner on Finding the Right Mix of Skills for a Board

Well-run boards are constantly evaluating their own make-up, including the optimal mix of skills and experience among their directors. In an interview with The Informed Board, Judy Bruner discusses the ways in which a variety...more

Hogan Lovells

Energy Buzz: Trends in construction contracts for energy transition projects

Hogan Lovells on

With plans for energy transition infrastructure projects well underway, their successful delivery demands that parties swiftly get to grips with the important issues when negotiating, administering and managing claims and...more

PilieroMazza PLLC

SWIFT to Launch May 1: DOD Fast Tracks Software Deployment Opening New Doors for Defense Contractors

PilieroMazza PLLC on

In a decisive move to stay ahead in an era of rapidly evolving digital threats, the Department of Defense (DOD) is accelerating its push for software modernization. The upcoming launch of the Software Fast Track (SWIFT)...more

J.S. Held

Top Ten Strategic Advantages of a vCISO with AI Expertise for Developing Business and Protecting AI Applications

J.S. Held on

In today’s fast-paced digital landscape, Artificial Intelligence (AI) is reshaping industries, unlocking new efficiencies, and enabling transformative business models. Companies leveraging AI to create applications or enhance...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Holland & Knight LLP

Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence

Holland & Knight LLP on

In the 20th episode of "Are We All Clear? Facilitating Security Clearances," host Molly O'Casey is joined by John Metz, a product manager at Agile Defense, and Antonia Tzinova, the head of Holland & Knight's CFIUS and...more

Morgan Lewis

Data Center Operations: Aligning Supply Chain, Compliance, and Customer Expectations

Morgan Lewis on

The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more

NAVEX

Business resiliency needs to take centerstage if you want to keep pace with cyber threats and supply chain disruptions

NAVEX on

2024 was a year of numerous and notable cybersecurity failures – although, to be fair, most years are now marred by numerous and notable cybersecurity failures. That’s no longer anything special. What makes 2024 interesting...more

Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

Husch Blackwell LLP

The Proposed Rule to Amend FAR Guidance on Safeguarding CUI – Care to Comment?

Husch Blackwell LLP on

The FAR Council issued a proposed rule that would amend the several FAR provisions and add new clauses to provide guidance on the safe handling of CUI. Public comments on the proposed rule are being accepted until March 17,...more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Wiley Rein LLP

[Podcast] The Impact of IoT Supply Chain Risks on Government Contracts

Wiley Rein LLP on

In this episode of Wiley’s Government Contracts podcast, partners Tracye Howard and Sara Baxenberg discuss the evolving national security concerns surrounding Internet of Things (IoT) modules produced by Chinese companies...more

126 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide