News & Analysis as of

Data Security Software

Mitratech Holdings, Inc

Switching Background Screening Vendors: 6 Tips To Make The Change

Choosing the right background screening vendor is a crucial step for any organization. The stakes are high, and getting it wrong can lead to costly mistakes or legal troubles. If you’re considering making a switch, you’re not...more

Mitratech Holdings, Inc

Immigration Case Management Software: Your Complete Guide

Juggling paperwork and navigating complex immigration case management and regulations difficult and, at times, can cause unnecessary risk. For any immigration law firm, technology can make all the difference in streamlining...more

Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

Foley & Lardner LLP

Technology Trends in Manufacturing and Associated Legal Risk Management: Driving Technological Advancement with an Ecosystem View 

Foley & Lardner LLP on

The importance of building technology-driven manufacturing businesses with an ecosystem focus—i.e., a comprehensive view of the complex network of suppliers, partners, and customers in a market—emerged as a critical theme for...more

Alston & Bird

CISA Releases Findings from its AI Pilot Program on Detecting Critical Vulnerabilities

Alston & Bird on

On July 28, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) announced that they piloted an Artificial Intelligence (AI)-enabled vulnerability program to help detect and remediate vulnerabilities in the U.S....more

Robinson+Cole Data Privacy + Security Insider

Commerce Department Bans Kaspersky Software in US

In the Biden Administration’s continuing effort to reduce the risk of cybersecurity spyware from foreign adversaries, including Russia, the United States Department of Commerce (Commerce) issued a final rule (Rule) on June...more

Orrick, Herrington & Sutcliffe LLP

A Customer Relationship Checklist for Cloud Providers, Including SaaS Companies, Operating in France

For more information about France’s SREN law, see our update that provides five key takeaways for businesses. Two new laws impose an array of obligations and restrictions on cloud providers in France. First, the European...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

HaystackID

Microsoft Delays Recall Rollout Amid Privacy Concerns

HaystackID on

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

Mitratech Holdings, Inc

Choosing the Right Software for Background Searches: Key Features to Consider

Background checks are essential in hiring, but many HR leaders skip them to save time. This approach causes headaches, so many employers turn to background search software. But with so many options available, how do you...more

Ward and Smith, P.A.

FTC: Three Enforcement Actions and a Ruling

Ward and Smith, P.A. on

In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Association of Certified E-Discovery...

Choosing an eDiscovery Vendor: Does Size Matter?

Growth of the eDiscovery industry has occurred through new companies, new products, and consolidation. So does a company’s size matter when you’re choosing an eDiscovery provider? Some of that choice comes down to preference,...more

HaystackID

Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity

HaystackID on

Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

NAVEX

Compliance & Cybersecurity – Working and Worrying Together About the Intersection of People and Technology

NAVEX on

I’m not a cyber expert, but as a compliance professional with accountability for internal investigations of employee and third-party misconduct I’ve had a front row seat to the evolution of risk that has mirrored the mass...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Ankura

Understanding Cyber Resilience: Key Principles of a Modern Security Strategy

Ankura on

In today's fast-paced digital world, organizations face an increasingly complex and evolving landscape of cyber threats. Cyberattacks are no longer a question of if but when, making it imperative for businesses to not only...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Furia Rubel Communications, Inc.

Embracing Data Privacy to Drive Business Growth with Aihong Yu, Chief Privacy Counsel of CDK Global

In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more

Orrick, Herrington & Sutcliffe LLP

FTC alleges a common enterprise’s software misrepresented consumers’ sensitive browsing data

On February 22, the FTC released a complaint and decision against multiple software companies operating as a common enterprise for allegedly violating three counts of Section 5 of the FTC Act for (1) unfairly collecting...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection - 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection: 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

127 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide