News & Analysis as of

Data Security Software

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Omnizant

WordPress Plugins: What All Firms Using WordPress Should Know

Omnizant on

Plugins are like accessories—and Coco Chanel said it best: “Before you leave the house, look in the mirror and remove one accessory.” Your website will work best with simplicity and intentionality. We love plugins because...more

Sheppard Mullin Richter & Hampton LLP

FedRAMP 20x – Update on Significant Change Process and Assessment Scope Standards

Last month, the federal government announced a major overhaul of the Federal Risk and Authorization Management Program (“FedRAMP”) called “FedRAMP 20x”. FedRAMP 20x is moving forward fast – with new authorizations, community...more

Robinson+Cole Data Privacy + Security Insider

WhatsApp Patches Vulnerability That Facilitates Remote Code Execution

WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more

Accelerynt, Inc.

How Over-engineered Security Stacks Are Killing Agility—And What to Do About It

Accelerynt, Inc. on

Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more

EDRM - Electronic Discovery Reference Model

New Battle of the Bots: ChatGPT 4.5 Challenges Reigning Champ ChatGPT 4o

Two AI heavyweights step into the ring: ChatGPT 4o, the reigning champion of fluency and speed, and the new challenger, ChatGPT 4.5, boasting an upgraded intellect and sharper wit. But which one is truly the best? To find...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #434 – Use of GenAI Tools Escaping Corporate Policies

According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more

U.S. Legal Support

How to Choose the Right Trial Technology Partner

U.S. Legal Support on

In 2025, technology holds a well-established place in the legal profession. And even though there are headlines about emerging tech itself being on trial, the pros of Artificial Intelligence (AI), Machine Learning (ML), and...more

Fenwick & West LLP

CLE Takeaways: Strategic Considerations at the Intersection of Games, IP, & AI

Fenwick & West LLP on

As artificial intelligence transforms gaming, developers and publishers need a clear, strategic approach to incorporating AI into their pipelines. Success requires balancing innovation with thoughtful risk management while...more

Robinson+Cole Data Privacy + Security Insider

Joint Cybersecurity Advisory Released on Ghost (Cring) Ransomware

The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center released an advisory on February 19, 2025, providing information on Ghost...more

EDRM - Electronic Discovery Reference Model

Breaking New Ground: Evaluating the Top AI Reasoning Models of 2025

The year 2025 has brought us closer than ever to the dawn of artificial general intelligence, with AI systems now capable of reasoning on par with humans—or even surpassing them in specific domains. In this article, I examine...more

Warner Norcross + Judd

Lessons from CES 2025: The Legal Side of Product Innovation — What Every Manufacturer and Supplier Needs to Know

Warner Norcross + Judd on

The 2025 Consumer Electronics Show (CES) — one of the world’s most influential tech events — once again showcased groundbreaking innovations that are shaping the future of technology. I was among the over 141,000 attendees of...more

Purpose Legal

Understanding the Basics of eDiscovery Processing

Purpose Legal on

In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more

Vinson & Elkins LLP

From Cloud to Compliance: Legal Essentials for Building and Operating AI-Ready Data Centers

Vinson & Elkins LLP on

Driven by the demand for AI-ready cloud infrastructure, the market cap for global data center construction, currently valued at more than $250 billion, is set to double in less than ten years, reaching half a trillion dollars...more

Davis Wright Tremaine LLP

Analyzing President Biden's Ambitious Cybersecurity Executive Order

In his final days in office, President Biden signed an ambitious executive order to improve the federal government's approach to cybersecurity. Executive Order 14114 ("Executive Order"), issued January 16, 2025, titled...more

Miller Nash LLP

Enterprise Liability Insurer Has Duty to Defend Against a Vendor’s Claim, Even When Presented as an Invoice for “Usage Fees”

Miller Nash LLP on

In a win for policyholders, a federal court in Washington recently held that an insurer had a duty to defend a technology company against a vendor’s demand for damages it allegedly suffered when hackers accessed software...more

Jenner & Block

Client Alert: White House Executive Order Seeks to Strengthen Federal Cybersecurity

Jenner & Block on

On January 16, 2025, former President Biden issued the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the EO). The EO directs various parts of the federal government to adopt a...more

Hogan Lovells

Security Snippets: CISA publishes sector-specific cyber performance goals for IT and product design

Hogan Lovells on

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more

Morrison & Foerster LLP - Government...

Biden’s Final Cybersecurity Order Proposes Significant Changes, All to Be Implemented by the Incoming Administration

Citing the threats posed by foreign adversaries and criminal organizations, and seeking enhanced accountability for companies that provide software and cloud services to the federal government, the Biden administration has...more

Clark Hill PLC

PowerSchool Data Breach Confirmed

Clark Hill PLC on

PowerSchool, a provider of software solutions for K-12 school systems, recently disclosed a cybersecurity incident that may have potentially exposed sensitive information of both students and school district employees....more

A&O Shearman

The EU Cyber Resilience Act - What You Need to Know

A&O Shearman on

The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more

Morrison & Foerster LLP - Government...

SHARE IT Act Requires Agencies to Share Custom-Developed Source Code Throughout the Government

On December 23, 2024, President Biden signed the Source Code Harmonization and Reuse in Information Technology Act (“SHARE IT Act” or “the Act”), which provides a formal mechanism for federal agencies to store and share...more

Association of Certified E-Discovery...

Tips for Paralegals and Litigation Support Professionals – December 2024

Don’t miss how easy it is to have Windows keep backups of folder contents, so you can always access the set of files that you had in a folder yesterday, a week ago, last year, or even 10 minutes ago....more

DLA Piper

EU: Cyber Resilience Act published in EU Official Journal

DLA Piper on

On 20 November 2024, the EU Cyber Resilience Act (CRA) was published in the Official Journal of the EU, kicking off the phased implementation of the CRA obligations....more

Mitratech Holdings, Inc

How to Successfully Implement a 2025 Return to Office Strategy

Mitratech Holdings, Inc on

As we approach 2025, the world of work continues to shift back to the old ways. But will they work anymore? As many organizations transition back to the office, there are difficulties. Most of those problems come within the...more

156 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide