News & Analysis as of

Encryption Software

Eversheds Sutherland (US) LLP

Quantum computing and the threat to existing encryption: NIST releases post-quantum guidance

Imagine a world in which powerful computers can instantaneously break a company’s standard encryption, threatening the most valuable financial data, intellectual property, personal information, and even national security...more

Bricker Graydon LLP

Federal Grant Provides $7 Million to Fund Cybersecurity Efforts by Local Governments

Bricker Graydon LLP on

Did your computer suffer from a blue screen of death due to the global IT outage caused by an update from CrowdStrike, a popular cybersecurity provider to many enterprises around the country? Cybersecurity concerns top the...more

Torres Trade Law, PLLC

Persistent Errors in the Export Classification of Software Products

Torres Trade Law, PLLC on

Many companies, particularly Software-as-a-Service (“SaaS”) and start-up companies, continue to struggle with the concept of export control classification of items with encryption functionality. This ongoing confusion is...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Davis Wright Tremaine LLP

Reminder: Have You Filed Your Encryption Self-Classification Reports with the Bureau of Industry and Security?

This is a reminder that annual self-classification reports and semi-annual reports for hardware, software, or technology utilizing encryption ("Encryption Items") were due to be filed by February 1, 2024, with the Bureau of...more

Trusaic

Is Data Security A Priority for Your Workplace Equity Provider?

Trusaic on

Cyberattacks continue to rise, increasing the need for robust data security. Global weekly attacks rose by 7% during the first quarter of 2023, versus the same quarter last year. Each organization is estimated to face on...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Perkins Coie

Four Data Security Safeguards the FTC Would Like Companies To Adopt in 2023

Perkins Coie on

Data security will undoubtedly remain an enforcement priority for the Federal Trade Commission in 2023. A presentation on the FTC’s approach to data security by Deputy Chief Technologist Alex Gaynor at a Commission open...more

Holland & Knight LLP

Hash Functions: Their Utility for Both Clients and Lawyers

Holland & Knight LLP on

"You're storing the passwords in plaintext?" My college professor looked at me puzzled. I had to immediately fix this. It was a huge security problem in my senior project, a web-based e-commerce platform. If any hacker tapped...more

Husch Blackwell LLP

The Private Sector Should Heed White House Warning On Cyber Resilience Because Compliance Is Coming

Husch Blackwell LLP on

The increased concern about ransomware incidents from both quantitative and severity standpoints, spurred the White House to urge corporate business leaders to improve their defenses and resilience posture against ransomware...more

Lowenstein Sandler LLP

Trade Matters - Lowenstein Sandler's Global Trade & Policy Newsletter - May 2021

Lowenstein Sandler LLP on

1. BIS Eliminates Reporting Requirements for Certain Encryption Items Effective March 29, 2021, BIS eliminated or reduced reporting requirements for certain encryption items. For encryption source code and beta test...more

Pillsbury Winthrop Shaw Pittman LLP

President Biden Announces Sweeping New Cybersecurity Reforms

The President’s new Executive Order on Improving the Nation’s Cybersecurity includes wide-ranging measures intended to strengthen security standards for the federal government and federal government contractors in response to...more

Foley & Lardner LLP

President Biden Issues Executive Order to Strengthen U.S. Cybersecurity Practices

Foley & Lardner LLP on

On May 12, 2021, President Biden issued an Executive Order on Improving the Nation’s Cybersecurity following a series of highly publicized cybersecurity incidents during the first four months of his presidency, including the...more

Goodwin

Spring Cleaning: U.S. Department of Commerce Eliminates Certain Reporting Requirements for Encryption Software

Goodwin on

In a well-received “spring cleaning,” the U.S. Department of Commerce’s Bureau of Industry & Security (BIS) has decluttered the thicket of regulations governing the export of encryption software and hardware. Among the...more

Rivkin Radler LLP

ABA Provides New Guidance On Remote Work For Lawyers

Rivkin Radler LLP on

On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more

Dechert LLP

COVID-19 Coronavirus Business Impact: Cybersecurity and Remote Working

Dechert LLP on

Many workers and employers are adjusting to remote working as a result of the COVID-19 pandemic. That shift has created a unique opportunity for cyber-attackers and criminals – the European Union Agency for Cybersecurity has...more

Sheppard Mullin Richter & Hampton LLP

From CFIUS, With Love: The FIRRMA Regulations

The most pressing question around the new FIRRMA regulations is “Will my transaction be covered?” To provide a bit of guidance on that point, we present an illustration from our upcoming Second Edition of The CFIUS Book due...more

Cooley LLP

Alert: Export Control Reminder: Encryption Reporting Deadline February 1, 2020

Cooley LLP on

The new year brings with it the reporting deadlines for exports of encryption items under the US Export Administration Regulations. February 1, 2020, is the deadline for submitting annual self-classification reports for...more

Akin Gump Strauss Hauer & Feld LLP

DDTC Publishes ITAR Carve-out for Encrypted Technical Data and Software, and Further Harmonizes Definitions Common to the ITAR and...

• On December 26, 2019, DDTC published an interim final rule that would allow, under certain conditions, encrypted technical data and software that is subject to the ITAR to be sent, shipped or stored outside the United...more

White & Case LLP

Cybersecurity and the UK legal landscape

White & Case LLP on

As businesses continue to digitise their assets and operations, the need to continually assess IT infrastructure and the technical measures in place to safeguard key information assets and data becomes ever more important....more

Robinson+Cole Data Privacy + Security Insider

SSD Hardware And BitLocker Encryption

Security researchers at Radboud University in the Netherlands have discovered a flaw in several manufacturers’ solid state hard drive firmware that can be exploited to read data from self-encrypting drives (SED)....more

Kelley Drye & Warren LLP

Time to Review Your Encryption Classifications – BIS Updates Primary Purpose Exemption

The Bureau of Industry and Security (BIS) recently published changes to its encryption regulations in an effort to simplify the text and focus the scope of controls. The biggest change is that Note 4, the “primary purpose...more

Snell & Wilmer

Data Privacy Day? Yep, it’s a Thing.

Snell & Wilmer on

For a number of years now, January 28 has been marked as “Data Privacy Day” (or, for our European friends, “Data Protection Day”), and it is often overlooked observed in the United States, Canada, India and many European...more

Hogan Lovells

Managing global telecom supply chains – What telecommunications companies need to know about trade control laws

Hogan Lovells on

Maintaining a global supply chain brings its share of commercial, financial, and regulatory risks. Increasingly, telecommunications companies with global operations and suppliers are finding that U.S. trade control laws...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide