News & Analysis as of

Information Technology Risk Management

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Fox Rothschild LLP

Update: FAR 2.0 Parts 18, 39, and 43 Released

Fox Rothschild LLP on

The Trump Administration, through the Office of Federal Procurement Policy, has revealed the next set of revised Federal Acquisition Regulation (FAR) sections as part of the Revolutionary FAR Overhaul (RFO): FAR Parts 18, 39,...more

Schwabe, Williamson & Wyatt PC

FAR Council Releases Modifications to Three Sections

The FAR Council is undertaking a systematic approach to revising the FARs. On Friday, June 13, 2025, it released its revisions to FAR Part 18 – Emergency Acquisitions, FAR Part 39 – Acquisition of Information and...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Association of Certified E-Discovery...

[Webinar] Beyond Cleanup: Turning Defensible Data into AI-Ready Insights - June 12th, 10:00 am PDT

You’ve cleaned up your data—now what? In the second part of this two-part webinar based on an actual case study, we’ll explore the next frontier: turning that defensible, well-managed data into a launchpad for AI-driven...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

EDRM - Electronic Discovery Reference Model

[Webinar] Down the Rabbit Hole: Navigating IP Theft Investigations - May 29th, 1:00 pm - 2:15 pm ET

Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

McDermott Will & Emery

Risk Management in the Modern Era of Workplace Generative AI

Generative artificial intelligence (GenAI) is becoming more prevalent in the workplace, including as a tool for human resources (HR) leaders to use in their employment practices. At the same time, close to a dozen states have...more

Troutman Pepper Locke

The Least Known Risk in the Energy Sector: The “ICTS” National Security Rules

Troutman Pepper Locke on

There are unprecedented risks and opportunities emerging for companies in the energy sector as the Trump administration’s priorities start to come into focus. Many of those are well-known to the industry. Here’s one that’s...more

Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

Morgan Lewis - Tech & Sourcing

Global Capability Centers: The Next Gen of Delivery Models

2025 has seen a notable push by companies to establish dedicated capability centers—or global capability centers (GCCs)—in countries with lower-cost resources and access to a strong talent pool. According to S&S Insider, the...more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Mitigation Strategies

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Key Risk Takeaways

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more

Davis Wright Tremaine LLP

FedRAMP 20x Initiative Promises Major Changes for Federal Cloud Service Providers

Major changes are coming again to the Federal Risk and Authorization Management Program ("FedRAMP"), the federal government's cybersecurity authorization program for cloud service providers ("CSPs")....more

A&O Shearman

EC publishes draft delegated regulation on subcontracting RTS under DORA

A&O Shearman on

On March 24 2025, the European Commission (EC) adopted the final draft Delegated Regulation setting out Regulatory Technical Standards (RTS) for subcontracting ICT services supporting critical or important functions under the...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Morgan Lewis - Tech & Sourcing

Outsourcing Update: The Convergence of Business Process Outsourcing and Digital Enablement

Gone are the days when a company could outsource the “people” that perform a business process without considering, and likely including in the outsourcing arrangement, the digital enablement of the underlying workflows and...more

Mitratech Holdings, Inc

The Vendor Onboarding Process: Keys to Success

What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more

Holland & Knight LLP

GSA Announces Overhaul of FedRAMP with Emphasis on Industry Input and Automation

Holland & Knight LLP on

The U.S. General Services Administration (GSA) recently announced plans to develop the Federal Risk and Authorization Management Program (FedRAMP) 20x – a new approach to the government-wide program for the security...more

Morgan Lewis

Data Center Operations: Aligning Supply Chain, Compliance, and Customer Expectations

Morgan Lewis on

The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more

Integreon

DORA Compliance Part 2: Addressing Compliance Across Critical Operational Areas

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Accelerynt, Inc.

How Over-engineered Security Stacks Are Killing Agility—And What to Do About It

Accelerynt, Inc. on

Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more

524 Results
 / 
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide