News & Analysis as of

Information Technology

Carey Olsen

Bermuda leads the way on digital transformation

Carey Olsen on

The surge in adoption of digital technologies and AI is rapidly changing the business, investment and security environments. The global demand for improved and increased digital infrastructure capacity, resilience, speed and...more

Blank Rome LLP

Department of Defense to Increase Scrutiny Over IT Consulting and Advisory Contracts

Blank Rome LLP on

The Department of Defense’s (“DoD”) Under Secretary for Acquisition and Sustainment issued a memorandum on June 23, 2025, that tightens oversight on DoD contracts for information technology consulting & management services...more

Offit Kurman

Maryland’s Sales Tax on IT Services: Key Insights and Compliance Tips

Offit Kurman on

As part of its 2025 Budget Reconciliation and Financing Act, Maryland is introducing a 3% sales and use tax on a broad range of information technology (IT) services, effective July 1, 2025. This “tech tax” is designed to...more

Quarles & Brady LLP

Trump Reverses Key Biden-Era Cyber Directives: Important Updates to Federal Cybersecurity Priorities

Quarles & Brady LLP on

Earlier this month, President Trump issued an Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), which amends both Biden...more

Fox Rothschild LLP

Update: FAR 2.0 Parts 18, 39, and 43 Released

Fox Rothschild LLP on

The Trump Administration, through the Office of Federal Procurement Policy, has revealed the next set of revised Federal Acquisition Regulation (FAR) sections as part of the Revolutionary FAR Overhaul (RFO): FAR Parts 18, 39,...more

Schwabe, Williamson & Wyatt PC

FAR Council Releases Modifications to Three Sections

The FAR Council is undertaking a systematic approach to revising the FARs. On Friday, June 13, 2025, it released its revisions to FAR Part 18 – Emergency Acquisitions, FAR Part 39 – Acquisition of Information and...more

McCarter & English Blog: Government Contracts...

Building the Cyber Fortress: New Cybersecurity Executive Order Targets Quantum, AI, and Supply Chain Security

On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more

Troutman Pepper Locke

Microsoft 365 eDiscovery Updates‎

Troutman Pepper Locke on

eMerge recently hosted a webinar exploring the latest changes to Microsoft 365 Purview's eDiscovery solution. Our panel of attorneys and technologists examined the nature of these updates and discussed the preparatory steps...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Proskauer - Labor Relations Update

NLRB Releases FY 2026 Budget: Proposed Staffing Cuts and Focus on Efficiency and IT Modernization

Amidst ongoing transitions—with the Board operating with a quorum and the President’s nominee for General Counsel pending Senate confirmation—the National Labor Relations Board (“NLRB” or “Board”) released its Fiscal Year...more

Carlton Fields

No Password Required: Reginald “Andre” Andre, CEO of ARK Solvers and Builder of Human + AI-Driven Culture

Carlton Fields on

Reginald “Andre” Andre is the dynamic founder and CEO of ARK Solvers. A chance encounter at a CompUSA store sparked a series of events that eventually created ARK Solvers — now one of South Florida’s fastest-growing IT and...more

Barnea Jaffa Lande & Co.

DORA for Tech Vendors - What You Should Know (But Haven’t Asked)

DORA (Digital Operational Resilience Act) is an EU regulation that sets rules for how financial entities manage ICT (Information and Communication Technology) risks. It covers areas like cyber resilience, incident reporting,...more

Holland & Knight LLP

DOD Secretary Directs Limitation of IT Consulting and Advisory Services Contracts

Holland & Knight LLP on

Contractors Should Seek to Distinguish Themselves in More Competitive Environment - The U.S. Department of Defense (DOD) on May 27, 2025, issued a memorandum implementing Executive Order (EO) 14222. As Holland & Knight...more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Holland & Knight LLP

DOD Secretary Directs Limitation of IT Consulting and Advisory Services Contracts

Holland & Knight LLP on

The U.S. Department of Defense (DOD) on May 27, 2025, issued a memorandum implementing Executive Order (EO) 14222. As our team previously summarized, EO 14222 implemented the Department of Government Efficiency's (DOGE) "cost...more

Association of Certified E-Discovery...

[Webinar] Beyond Cleanup: Turning Defensible Data into AI-Ready Insights - June 12th, 10:00 am PDT

You’ve cleaned up your data—now what? In the second part of this two-part webinar based on an actual case study, we’ll explore the next frontier: turning that defensible, well-managed data into a launchpad for AI-driven...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Dickinson Wright

Cyber Risk, Real Consequences: DOJ Steps Up Enforcement

Dickinson Wright on

Government efforts to enforce cybersecurity control requirements have moved forward in the opening months of the Trump administration. Regardless of the changes coming to other areas of contracting and the Federal Acquisition...more

Holland & Knight LLP

New Executive Action Aims to Streamline Environmental Reviews Through Digital Modernization

Holland & Knight LLP on

The Trump Administration has issued a Presidential Memorandum, "Updating Permitting Technology for the 21st Century," aimed at modernizing and streamlining the federal environmental review and permitting processes through...more

EDRM - Electronic Discovery Reference Model

[Webinar] Down the Rabbit Hole: Navigating IP Theft Investigations - May 29th, 1:00 pm - 2:15 pm ET

Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

U.S. Legal Support

Cybersecurity’s Role in Legal Transcription

U.S. Legal Support on

Legal transcription services play a vital role in legal matters, ensuring that live oral arguments and other audio or video content are fully accessible to all stakeholders in text. When managing transcription...more

McDermott Will & Emery

Risk Management in the Modern Era of Workplace Generative AI

Generative artificial intelligence (GenAI) is becoming more prevalent in the workplace, including as a tool for human resources (HR) leaders to use in their employment practices. At the same time, close to a dozen states have...more

1,968 Results
 / 
View per page
Page: of 79

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide