News & Analysis as of

Information Technology Cybersecurity Technology

Mitratech Holdings, Inc

5 Common Pitfalls in IT Disaster Recovery (and How to Avoid Them)

Even the strongest IT/DR plans can fail if they aren’t proactive about avoiding these common mistakes. When systems go down, business grinds to a halt. Downtime leads to $9,000 in losses per minute on average, damaged...more

Amundsen Davis LLC

Bringing AI Out of the Shadows: How to Manage the Use of AI in Your Workplace

Amundsen Davis LLC on

Artificial intelligence (AI) is everywhere these days, including your workplace. While there is no one-size-fits-all AI policy that will work for every company, here are our general thoughts about how employers can...more

BCLP

The EU’s Digital Operational Resilience Act 2022/2554 (DORA)

BCLP on

Long IT sub-contracting chains can make it hard for financial institutions to understand the vulnerabilities in their IT estate and the location of key functions (where these may be located in entities who do not have a...more

Venable LLP

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Venable LLP on

The Digital Operational Resilience Act (DORA) regulation is part of the European Union’s (EU) strategy to enhance the overall stability of the EU financial system by ensuring that financial entities are resilient to digital...more

Benesch

Document Retention for Motor Carriers and Transportation Brokers

Benesch on

Transportation services providers are increasingly facing new technology-oriented threats in day-to-day business. Recent cyberattacks and the potential for serious disruption from threat actors have drawn the attention of the...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Sheppard Mullin Richter & Hampton LLP

Emerging AI Landscape: FedRAMP Publishes Draft Emerging Technology Prioritization Framework in Response to Executive Order on...

On January 26, 2024, the Federal Risk and Authorization Management Program (“FedRAMP”) published a draft Emerging Technology Prioritization Framework developed in response to President Biden’s Executive Order 14110 on Safe,...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 9, November 2023

The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more

Cranfill Sumner LLP

White House Lays Groundwork for AI Regulation

Cranfill Sumner LLP on

The Biden-Harris Administration announced issuance of an Executive Order (“EO”) on October 30, 2023 that directs various Executive Agencies to study and draft regulations to address concerns regarding Artificial Intelligence...more

Eversheds Sutherland (US) LLP

NAIC Report - 2023 Summer National Meeting

The National Association of Insurance Commissioners (NAIC) held its 2023 Summer National Meeting from August 12 to 16 in Seattle, Washington. As has become the norm, a number of relevant NAIC working groups and task forces...more

A&O Shearman

UK – NCSC publishes guidance on shadow IT

A&O Shearman on

The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more

Faegre Drinker Biddle & Reath LLP

New York Department of Financial Services Levies $1.2 Million Fine on Cryptocurrency Platform for Violations of Cybersecurity...

A recent consent order between the New York State Department of Financial Services (“NYDFS”) and cryptocurrency trading platform, bitFlyer USA (“bitFlyer”), shows that the NYDFS continues to utilize an aggressive enforcement...more

J.S. Held

Cyber Hygiene in 2023: Part 2 – Cyber Hygiene for Remote and Hybrid Workforce

J.S. Held on

In the first part of this mini-series, we identified that showing everyday users how to secure data may not be as important as highlighting why data security matters. The “why” helps everyday users appreciate and internalize...more

J.S. Held

Cyber Hygiene in 2023: Part 1 – Getting Buy-In from Users

J.S. Held on

As we progress through 2023, both new and old cyber challenges remain, but opportunities for improvement are present. For the upcoming year, assume the following: 1. Past challenges have not been overcome, and we still...more

Reveal

8 Internal Investigation Trends That Will Define The Legal Industry in 2023

Reveal on

As a corporate investigator, you know that there are nuances to internal investigations that fluctuate over time. While the basic mandate stays the same - investigate potential wrongdoing and noncompliance to determine...more

Venable LLP

Identity as a Key Enabler for Cloud

Venable LLP on

Legacy identity and access management (IAM) is often considered a cumbersome, complex, and archaic monolith. In particular, legacy IAM often requires lengthy development time for updates and onboarding new applications,...more

Sheppard Mullin Richter & Hampton LLP

Seeking HoNIST Opinions, Part II – NIST Invites Comments on Major Revision to Cyber Supply Chain Risk Management Practices and...

The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Sheppard Mullin Richter & Hampton LLP

Seeking HoNIST Opinions – NIST Invites Comments on Major Revision to Cyber Supply Chain Risk Management Practices for Systems and...

The National Institute of Standards and Technology (“NIST”) is seeking comments on its draft NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on April 29, 2021....more

Sheppard Mullin Richter & Hampton LLP

Biden’s Cybersecurity Executive Order

On May 12, 2021, the Biden Administration issued its much anticipated “Executive Order on Improving the Nation’s Cybersecurity.” Below are provisions we believe will be of most interest to contractors, as well as any company...more

Vinson & Elkins LLP

The Pandemic Lessons: The Future Of ESG And How It Will Define Business Success

Vinson & Elkins LLP on

The rapidly increasing importance of a company’s environmental, social and governance (ESG) performance to its business value, has been a critical trend leading into 2020. This trend was accelerated by the COVID-19 pandemic,...more

BCLP

Getting The Deal Through - Cloud Computing 2020

BCLP on

What kinds of cloud computing transactions take place in your jurisdiction? As a G7 economy with mature IT and related services markets, the UK is one of the most important global markets for cloud computing. According to...more

Orrick, Herrington & Sutcliffe LLP

German Parliament's IT-Security Act Covers Critical Infrastructure

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide