News & Analysis as of

Information Technology Risk Management China

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Mitigation Strategies

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Key Risk Takeaways

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more

Sheppard Mullin Richter & Hampton LLP

Data, Deals, and Diplomacy, Part III: DOJ Issues National Security Final Rule with New Data Compliance Obligations for...

On January 8, 2025, the Department of Justice (“DOJ”) published its final rule addressing Executive Order (E.O.) 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

American Conference Institute (ACI)

[Event] Advanced Forum on Global Export Controls - February 25th - 26th, Arlington, VA

Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more

Morrison & Foerster LLP

Commerce Rings in New Year with Proposed Rulemaking on Drones

The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Robinson+Cole Data Privacy + Security Insider

CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors

The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored...more

Robinson+Cole Data Privacy + Security Insider

NIST Releases Guidance on Supply Chain Security

The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more

Robinson+Cole Data Privacy + Security Insider

China-Based Ransomware Operator Exploiting Log4j Vulnerability

Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more

Robins Kaplan LLP

Financial Daily Dose 1.7.2020 | Top Story: Facebook Ban of “Deepfakes”

Robins Kaplan LLP on

Facebook wages a war on misinformation. On Monday, Facebook announced it will start removing videos altered by artificial intelligence that are likely to mislead people into thinking that a subject of the video made...more

ArentFox Schiff

US Administration Tests the Water on New Unheard-of Government Review of International Technology Transactions

ArentFox Schiff on

Under this new evaluation process, Commerce can prohibit companies from engaging in a wide variety of transactions and order them to cease using the information technology or telecommunication system in question even if it is...more

Hogan Lovells

Legislative and Regulatory Update on Federal Supply Chain Risk Management

Hogan Lovells on

The U.S. Government is renewing its focus on mitigating technological risks by regulating the supply chain for various goods and services. ...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide