News & Analysis as of

National Security Cybersecurity Data Protection

White & Case LLP

AI Watch: Global regulatory tracker - Kenya (UPDATED)

White & Case LLP on

Between January 14 and January 19, 2025, the Ministry of Information, Communications, and Technology (the "Ministry") held a consultation on a draft of Kenya's National Artificial Intelligence (AI) Strategy 2025-2030. This...more

Hogan Lovells

End-to-end encryption: obstacle or pillar of national security?

Hogan Lovells on

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 120

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Clark Hill PLC

The Learned Concierge - March 2025, Vol. 17

Clark Hill PLC on

The Learned Concierge - Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries....more

HaystackID

Inside TikTok’s U.S. Data Security Operation: A Rare Look at the Battle Over User Data

HaystackID on

The controversy surrounding TikTok has dominated political discussions for years. Critics claim the app is a national security risk, a data funnel to the Chinese Communist Party, and a vehicle for foreign propaganda. TikTok,...more

Wiley Rein LLP

New DOJ Restrictions on Cross-Border Data Transactions Take Effect April 8: Ten Questions as Your Business Prepares to Comply

Wiley Rein LLP on

The U.S. Department of Justice’s (DOJ) sweeping new rule on cross-border data transactions is set to take effect in substantial part next month, with broad implications for companies that transfer U.S. personal data or...more

Sheppard Mullin Richter & Hampton LLP

Healthcare Security is Homeland Security: A Discussion with Jonathan Meyer

In an era where cyber threats are escalating, healthcare has emerged as a critical battleground for security. Its significance has become increasingly crucial as the intersection of healthcare, cybersecurity, and technology...more

Wiley Rein LLP

CISA 2015 Reauthorization – Are Changes on the Horizon?

Wiley Rein LLP on

As we noted in Federal Cybersecurity Policy in 2025: What to Watch in Changing Times, key parts of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), the United States’ foundational cybersecurity information...more

HaystackID

AI Playbook: UK Government’s Strategy for Responsible AI Adoption in the Public Sector

HaystackID on

The United Kingdom is taking a strategic approach to artificial intelligence (AI) adoption within its public sector to drive economic growth and improve public services. Central to this effort is the UK’s AI Playbook, a...more

Akin Gump Strauss Hauer & Feld LLP

Security Requirements and Compliance Obligations in DOJ's Final Rule on Data Transactions

The Department of Justice’s (DOJ) final rule implements President Biden’s Executive Order 14117 of February 28, 2024, on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

Akin Gump Strauss Hauer & Feld LLP

DOJ Regulations Will Restrict Data Transactions to Address National Security Concerns

The Department of Justice’s (DOJ) final rule implements President Biden’s Executive Order 14117 of February 28, 2024, on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

Troutman Pepper Locke

Do You Know Where Your Data Is Going? On April 8, New National Security Rules Take Effect

Troutman Pepper Locke on

A groundbreaking new regulatory regime, imposing rules unlike any in existing U.S. law, may surprise many companies due to its sudden adoption and complexity. This article tries to simplify the changing regulatory landscape,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #431 – DOGE Has Access to Our Personal Information: What You Need to Know

According to a highly critical article recently published by TechCrunch,  the Department of Government Efficiency (DOGE), President Trump’s advisory board headed by Elon Musk, has “taken control of top federal departments and...more

Paul Hastings LLP

DOJ and CISA Issue Proposed Rules Regulating Export of Bulk Sensitive Data

Paul Hastings LLP on

The Department of Justice (DOJ) released a Final Rule restricting certain transfers of Americans’ sensitive personal data to identified countries of concern or covered individuals. The Final Rule continues to assert the DOJ...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 119

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Robinson+Cole Data Privacy + Security Insider

Nation State Backed Groups Using AI for Malicious Purposes

The Google Threat Intelligence Group (GTIG) recently published a new report “Adversarial Misuse of Generative AI,” which is well worth the read. The report shares findings on how government-backed threat actors use and misuse...more

Robinson+Cole Data Privacy + Security Insider

DeepSeek AI’s Security Woes + Impersonations: What You Need to Know

Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more

Davis Wright Tremaine LLP

New Administration Outlook: What Happens to Biden's Cybersecurity Order Under Trump?

In his final days in office, President Biden signed an ambitious executive order to improve the federal government's approach to cybersecurity. How this sweeping order will fare under the Trump Administration is difficult to...more

Alston & Bird

UK Government Proposes Targeted Ban on Ransom Payments and Increased Ransomware Incident Reporting

Alston & Bird on

On January 14, 2025, the United Kingdom government published a consultation on ransomware proposing new measures to increase incident reporting and reduce ransom payments (the “Consultation”). The Consultation outlines three...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

New DHS Security Requirements Impact Compliance for Employers with Workers in Six “Countries of Concern”

The U.S. Department of Homeland Security (DHS) recently published new security requirements for certain restricted transactions covered by the U.S. Department of Justice’s (DOJ) sensitive data export rules. ...more

Perkins Coie

User’s Guide to DOJ & CISA Rules Implementing Executive Order 14117

Perkins Coie on

Executive Order (EO) 14117 is a national security rule intended to mitigate national security risks posed by threat countries’ access to sensitive personal data and government-related data. The EO directed the U.S....more

Sheppard Mullin Richter & Hampton LLP

Looking Beyond FedRAMP – Lessons from the U.S. Treasury Cybersecurity Incident

In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more

154 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide