News & Analysis as of

Data Security National Security Risk Mitigation

Lathrop GPM

New DOJ Limits on Cross-Border Data Transfers Prompt Assessment by Businesses

Lathrop GPM on

On April 8, the National Security Division of the U.S. Department of Justice’s (DOJ) new rule on cross-border data transfers takes effect. It restricts U.S. businesses from transferring certain bulk sensitive personal data to...more

Faegre Drinker Biddle & Reath LLP

The Wallet Inspectors: The DPRK’s Sophisticated Campaign to Steal Cryptocurrency and How to Protect Yourself

On February 21, 2025, Bybit, one of the world’s largest cryptocurrency exchanges, suffered a cyberattack resulting in the theft of approximately $1.5 billion in Ethereum tokens.  This attack marked a new pinnacle in the...more

Wolf, Greenfield & Sacks, P.C.

USPTO Guidance on Use of AI-Based Tools in Practice: How to Mitigate Risk

Use of AI-based tools are permitted, but parties should use caution to ensure compliance with all duties and obligations - Recognizing that AI tools are already being used by parties practicing before the USPTO, this week the...more

Patterson Belknap Webb & Tyler LLP

White House Issues Further Guidance for Federal Agencies on Cybersecurity Priorities

The White House recently issued a Memorandum designed to strengthen the cyber defenses of “National Security Systems” – information systems operated by the federal government that are used for intelligence or military...more

Health Care Compliance Association (HCCA)

FBI: More Awareness, Due Diligence Needed To Fight China in New ‘Space Race’ for Data

Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more

Saul Ewing LLP

President Biden’s Cybersecurity Executive Order Designed to Strengthen Nation’s Defenses

Saul Ewing LLP on

In the wake of several recent major cyberattacks, President Biden issued a sweeping Executive Order on Improving the Nation’s Cybersecurity (“Order”) on May 12, 2012. The Order reflects the Administration’s policy of...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

Bass, Berry & Sims PLC

Vulnerable Systems: Contractor Protection of Controlled Unclassified Information at Risk

The Department of Defense (DoD) Inspector General recently issued a report summarizing the findings of an audit into the protection of Controlled Unclassified Information (CUI) on contractor networks. Based on an in-depth...more

Womble Bond Dickinson

White House Releases National Cyber Strategy: Five Benefits for American Businesses

Womble Bond Dickinson on

“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more

Snell & Wilmer

Cybersecurity on Your Project: Why Not Follow National Security Strategy?

Snell & Wilmer on

In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide