News & Analysis as of

Hardware Software Cybersecurity

Pillsbury Winthrop Shaw Pittman LLP

The EU’s Cyber Resilience Act: New Cybersecurity Requirements for Connected Products and Software

The CRA will affect a broad range of digital products placed on the EU market (including by those based outside the EU), including connected hardware/devices, software and remote data processing solutions. The EU has adopted...more

DLA Piper

EU: Cyber Resilience Act published in EU Official Journal

DLA Piper on

On 20 November 2024, the EU Cyber Resilience Act (CRA) was published in the Official Journal of the EU, kicking off the phased implementation of the CRA obligations....more

Jones Day

EU Enacts Broad Cybersecurity Requirements for Hardware and Software Products

Jones Day on

On October 10, 2024, the EU Cyber Resilience Act ("CRA") was adopted by the Council of the European Union....more

Goodwin

EU Adopts Cyber Resilience Act for Connected Devices

Goodwin on

On October 10, 2024, the European Council officially adopted the Cyber Resilience Act (CRA), a regulation designed to ensure that products with digital features are secure to use and resilient against cyber threats, and that...more

HaystackID

[Webcast Transcript] From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators

HaystackID on

Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Supply Chain Attacks in the UK: Reducing Risk and Preparing for Upcoming Legal Changes

Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more

HaystackID

[Webcast Transcript] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future

HaystackID on

Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Spilman Thomas & Battle, PLLC

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data?

As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?”, we are addressing the recent 9th Circuit decision in Jones v. Ford Motor Co. At issue in this matter...more

Foley & Lardner LLP

NIST’s AI Risk Management Framework Helps Businesses Address AI Risk

Foley & Lardner LLP on

As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

Shipkevich PLLC

Metaverse Primer

Shipkevich PLLC on

The term “metaverse” first appeared in 1992 as an abstract concept in Neal Stephenson’s dystopian novel Snow Crash. Two decades later, the Metaverse has since evolved from a mere idea to a figment of everyday reality, as it...more

Polsinelli

EU Cyber Resilience Act

Polsinelli on

On September 15, 2022, the European Commission published its Proposal for a Cyber Resilience Act (CRA) which sets out new requirements for hardware and software products in the EU.  The CRA applies to hardware and...more

Wilson Sonsini Goodrich & Rosati

European Commission Proposes New EU Cybersecurity Rules for Software and Hardware Products

On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more

A&O Shearman

EU – New Cyber Resilience Act will provide cybersecurity requirements for hardware and software products

A&O Shearman on

On 15 September 2022, the European Commission published its proposal for a new Cyber Resilience Act (the Act) that introduces common cybersecurity rules for placing products with digital elements on the EU market. ...more

Foley & Lardner LLP

Security Measures to Deploy Now to Defend Against a Russian Cyberattack

Foley & Lardner LLP on

On February 22, 2022, U.S. Department of Homeland Security Secretary Alejandro Mayorkas warned critical infrastructure organizations located in the United States of possible cyberattacks by Russian state-sponsored actors in...more

Foley & Lardner LLP

FDA Addresses the Role of Digital Health Technology in Clinical Trials

Foley & Lardner LLP on

The U.S. Food & Drug Administration (FDA) recently issued draft guidance regarding the use of digital health technology (DHT) for the remote acquisition of clinical trial data. DHT can take the form of hardware and...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Binding Operational Directive on Patching Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a Binding Operational Directive requiring all federal agencies to apply patches to new and old vulnerabilities that are being exploited in the wild....more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide