News & Analysis as of

Data Security Cybersecurity National Security

Alston & Bird

Trump Administration Releases Cyber Executive Order Revealing Renewed Strategy for U.S. Cybersecurity

Alston & Bird on

On June 6, 2025, President Trump issued an Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity, amending certain prior directives established by the Biden and Obama administrations....more

Morrison & Foerster LLP

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones

Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Womble Bond Dickinson

More States Ban Foreign AI Tools on Government Devices

Womble Bond Dickinson on

Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Alston & Bird

FCC Announces New National Security Unit Focusing on State-Sponsored Cyber Threats

Alston & Bird on

On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more

Cozen O'Connor

AGs Urge Congress to Ban DeepSeek AI from Government Devices

Cozen O'Connor on

A coalition of 21 Republican AGs, led by Montana AG Austin Knudsen, is urging Congress to pass the No DeepSeek on Government Devices Act, which would prohibit downloading and using DeepSeek’s AI software on government...more

HaystackID

Inside TikTok’s U.S. Data Security Operation: A Rare Look at the Battle Over User Data

HaystackID on

The controversy surrounding TikTok has dominated political discussions for years. Critics claim the app is a national security risk, a data funnel to the Chinese Communist Party, and a vehicle for foreign propaganda. TikTok,...more

Dacheng

DeepSeek and China’s AI Regulatory Landscape: Rules, Practice and Future Prospects

Dacheng on

During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more

Faegre Drinker Biddle & Reath LLP

The Wallet Inspectors: The DPRK’s Sophisticated Campaign to Steal Cryptocurrency and How to Protect Yourself

On February 21, 2025, Bybit, one of the world’s largest cryptocurrency exchanges, suffered a cyberattack resulting in the theft of approximately $1.5 billion in Ethereum tokens.  This attack marked a new pinnacle in the...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

Akin Gump Strauss Hauer & Feld LLP

Security Requirements and Compliance Obligations in DOJ's Final Rule on Data Transactions

The Department of Justice’s (DOJ) final rule implements President Biden’s Executive Order 14117 of February 28, 2024, on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

Robinson+Cole Data Privacy + Security Insider

Texas AG Investigates DeepSeek + List of Banned Countries Expands

Texas Attorney General Ken Paxton announced on February 14, 2024, that his office has opened an investigation into DeepSeek’s privacy practices. DeepSeek, an artificial intelligence company with ties to the People’s Republic...more

Akin Gump Strauss Hauer & Feld LLP

DOJ Regulations Will Restrict Data Transactions to Address National Security Concerns

The Department of Justice’s (DOJ) final rule implements President Biden’s Executive Order 14117 of February 28, 2024, on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

Morris, Manning & Martin, LLP

New CMMC 2.0 Guidance Issued

The Department of Defense (DoD) recently issued a memo titled, "Implementing the Cybersecurity Maturity Model Certification (CMMC) Program: Guidance for Determining Appropriate CMMC Compliance Assessment Levels and Process...more

Troutman Pepper Locke

Do You Know Where Your Data Is Going? On April 8, New National Security Rules Take Effect

Troutman Pepper Locke on

A groundbreaking new regulatory regime, imposing rules unlike any in existing U.S. law, may surprise many companies due to its sudden adoption and complexity. This article tries to simplify the changing regulatory landscape,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #431 – DOGE Has Access to Our Personal Information: What You Need to Know

According to a highly critical article recently published by TechCrunch,  the Department of Government Efficiency (DOGE), President Trump’s advisory board headed by Elon Musk, has “taken control of top federal departments and...more

Robinson+Cole Data Privacy + Security Insider

Three States Ban DeepSeek Use on State Devices and Networks

New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more

Paul Hastings LLP

DOJ and CISA Issue Proposed Rules Regulating Export of Bulk Sensitive Data

Paul Hastings LLP on

The Department of Justice (DOJ) released a Final Rule restricting certain transfers of Americans’ sensitive personal data to identified countries of concern or covered individuals. The Final Rule continues to assert the DOJ...more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Robinson+Cole Data Privacy + Security Insider

DeepSeek AI’s Security Woes + Impersonations: What You Need to Know

Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more

Mintz - Technology, Communications & Media...

What’s New in Wireless - February 2025

The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more

142 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide