News & Analysis as of

Information Technology Data Protection Software

Ankura

Optimizing Organizational Efficiency Through Tool Rationalization

Ankura on

In an era where technology drives business success, organizations often find themselves managing an overwhelming number of tools and applications — whether purchased officially through procurement or individually at a...more

Hogan Lovells

Security Snippets: CISA publishes sector-specific cyber performance goals for IT and product design

Hogan Lovells on

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more

A&O Shearman

The EU Cyber Resilience Act - What You Need to Know

A&O Shearman on

The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more

Robinson+Cole Data Privacy + Security Insider

Cl0p Exploiting Cleo Software

According to Cyberscoop, the cyber gang Cl0p “has claimed responsibility for attacks tied to vulnerabilities in software made by Cleo, an Illinois-based IT company that sells various types of enterprise software.” The gang...more

Epiq

The Top Five Questions Legal Should Ask IT During Copilot for Microsoft 365 Adoption

Epiq on

It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce.   There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #373 – If you Use Windows Copilot —Configuration Update Issued by Microsoft This Week

On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2  (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more

The Volkov Law Group

Technical Elements of a Cybersecurity Compliance Program (IV of IV)

The Volkov Law Group on

The term cybersecurity is thrown about because it covers so many risks.  There is no common definition of cybersecurity and the technical elements included in the term.  From a technical standpoint, cybersecurity covers...more

Wilson Sonsini Goodrich & Rosati

European Commission Proposes New EU Cybersecurity Rules for Software and Hardware Products

On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more

Robinson+Cole Data Privacy + Security Insider

NIST Releases Guidance on Supply Chain Security

The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more

Faegre Drinker Biddle & Reath LLP

Cybersecurity Safeguard Implemented by Superior Court of New Jersey for OUS Web Traffic

Last year, we explored the Federal Judiciary’s new safeguards and procedures to protect sensitive court records in light of the SolarWinds Orion cybersecurity breach. Now, as a result of increased hostilities between Russia...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Womble Bond Dickinson

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Womble Bond Dickinson on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Stinson - Government Contracting Matters

Biden’s Executive Order on Protecting Americans’ Sensitive Data from Foreign Adversaries

Published on June 9, 2021, President Biden’s Executive Order on Protecting America’s Sensitive Data from Foreign Adversaries is the latest Executive Order seeking to strengthen national security by improving public and...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Patch Tuesday Includes Six Zero Day-Related Vulnerabilities

IT professionals leave room in their schedules for Microsoft’s monthly Patch Tuesday just as I leave room in my schedule every Wednesday night for blog writing. ...more

Robinson+Cole Data Privacy + Security Insider

FBI Issues Flash Alert to Users of Fortinet Fortigate

The FBI recently issued a Flash Alert to Fortinet Fortigate users that Advanced Persistent Threat (APT) groups are continuing to exploit devices that have not been patched. Although Fortinet issued patches for these...more

Stinson - Government Contracting Matters

DIB Take Note: SolarWinds Hack and DHS CISA Emergency Directive on Cyber Vulnerabilities Point to the Need to be Prepared for APTs

If you don’t know about SolarWinds, then you haven’t been reading the news for the past six months. Last October 2020, it was reported that a widely-used networking tool that helps companies in the public and private sectors...more

Patterson Belknap Webb & Tyler LLP

Hack of IT Service Provider May Affect Thousands of Private Businesses

On December 13, the software and service provider SolarWinds announced that its Orion software platform had been the target of a sophisticated cyber-attack that may have resulted in malicious code being pushed to as many as...more

Orrick, Herrington & Sutcliffe LLP

Using M&A Insurance on Tech Deals (Issue 2): Software/SaaS, Internet Telephony and On-Demand

In our first issue, we looked at how valuation, IP and cyber were areas of key focus for M&A insurers on most tech transactions. In this note, the attention shifts to distinct areas of focus for underwriters around three...more

Mitratech Holdings, Inc

Compliance Management: Choosing the Right Data Privacy Software, Part 3

For maintaining data privacy, it’s vital to both know your compliance obligations and to be able to predict future risks based on past compliance breakdowns. ...more

22 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide