News & Analysis as of

Today's Popular Updates Data Security Software

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
HaystackID

Microsoft Delays Recall Rollout Amid Privacy Concerns

HaystackID on

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

HaystackID

Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity

HaystackID on

Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Mitratech Holdings, Inc

How HR Technology Drives Organizational Success

Mitratech Holdings, Inc on

Ask any long-time HR professional what the most significant change of the last few years has been, and they’ll all tell you the same things: the use of HR technology and the investment in human capital. The two are...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Sheppard Mullin Richter & Hampton LLP

Two New Cybersecurity Proposed Rules Mean Big Changes for Federal Contractors

On October 3, 2023, the FAR Council released two long-awaited proposed rules for federal contractor cybersecurity stemming from the Biden Administration’s Cybersecurity Executive Order from May 2021 (Executive Order 14028)....more

ArentFox Schiff

ArentFox Schiff Issues the First Global Definitive Legal Guide for Industries Navigating AI

ArentFox Schiff on

Artificial intelligence promises to transform the way we live and work and its impact will undoubtedly stretch to every business sector across the globe. This next generation of technology brings exciting possibilities and...more

ArentFox Schiff

The Generative AI Revolution: Key Legal Considerations for the Hospitality Industry

ArentFox Schiff on

For better or worse, generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Sheppard Mullin Richter & Hampton LLP

Do Business With the Federal Government? Here’s a 2022 Cybersecurity Recap: Part Three - Secure Software Development Attestation...

Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

Sheppard Mullin Richter & Hampton LLP

NIST Releases New Guidance on Software Security and Cybersecurity Consumer Labeling Programs

NIST recently released several key deliverables relating to cybersecurity. These focus on secure software development and new consumer labeling programs as contemplated by President Biden’s Executive Order 14028, which seeks...more

Faegre Drinker Biddle & Reath LLP

Discerning Data Cyber Vulnerability Alert: Log4j

According to numerous government and media sources, malicious cyber actors are targeting a new “zero day” vulnerability on a massive scale. This vulnerability, referred to as “Log4j” or “Log4Shell,” has resulted in widespread...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

McDermott Will & Emery

New Zero-Day Vulnerability for Log4j is the Next Cybersecurity Nightmare

McDermott Will & Emery on

On December 10, 2021, multiple media outlets, the Cybersecurity and Infrastructure Security Administration (CISA), and the director of cybersecurity at the National Security Agency (NSA) began alerting to a significant...more

Sheppard Mullin Richter & Hampton LLP

NYDFS Issues Supply Chain Management Guidance

The New York State Department of Financial Services recently issued recommendations to financial institutions in the aftermath of the SolarWinds cyberattack. In that attack, hackers inserted malware into SolarWinds software...more

Faegre Drinker Biddle & Reath LLP

Buyer Beware: The Internet of Things Comes Under New Cyber Attack from Multiple Fronts

It is estimated that by the end of 2020, there will be more than 50,000,000,000 (yes, billion) connected devices that are part of the Internet of Things (IoT). This is a five million percent increase in IoT devices over the...more

White & Case LLP

Cybersecurity and the UK legal landscape

White & Case LLP on

As businesses continue to digitise their assets and operations, the need to continually assess IT infrastructure and the technical measures in place to safeguard key information assets and data becomes ever more important....more

Farella Braun + Martel LLP

Are You Covered for California’s New Iot Laws?

In November, Tyler wrote about insurance issues raised by both the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act, which goes into effect on January 1, 2020. California’s...more

Akin Gump Strauss Hauer & Feld LLP

Six Recent Government Supply Chain Risk and Cybersecurity Initiatives

• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more

King & Spalding

Cloud Computing and Issues to Consider During Agreement Negotiations

King & Spalding on

Cloud computing is a subscription-based service where a person or business can obtain networked storage space and computer resources for a fee. There are different types of cloud computing services. The two most...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide