News & Analysis as of

Risk Management Data Security Today's Popular Updates

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 2

Ankura on

The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more

Rumberger | Kirk

What DeepSeek Can Teach Legal Teams About Creating Stronger GenAI Policies

Rumberger | Kirk on

The instant popularity of China’s DeepSeek-V3 generative artificial intelligence model underscores why companies should craft stronger GenAI policies that minimize the risks of employees exposing sensitive data, violating...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

FBI Warns of Hidden Threats in Remote Hiring: Are North Korean Hackers Your Newest Employees?

The Federal Bureau of Investigation (FBI) recently warned employers of increasing security risks from North Korean workers infiltrating U.S. companies by obtaining remote jobs to steal proprietary information and extort money...more

Baker Donelson

Top Five AI Procurement Questions General Counsel for Manufacturers Should Consider

Baker Donelson on

Artificial intelligence (AI) is reshaping the future of manufacturing. As manufacturing operations shift back to the U.S. in response to recent tariff policies, general counsels (GCs) in the manufacturing sector face a...more

Harris Beach Murtha PLLC

Generative AI Browser Extensions and Plug-ins: A Security and Privacy Challenge

Generative AI is incredibly popular. So popular that many GenAI tools now have browser extensions that work across all open pages of the browsers upon which they are installed. They helpfully summarize pages, highlight...more

J.S. Held

2025 J.S. Held Global Risk Report: Artificial Intelligence, Data & Digital Regulations

J.S. Held on

Artificial Intelligence (AI) has been touted as the answer to a multitude of business challenges. However, AI – along with machine learning and large language models (LLMs) – is still fraught with technical and regulatory...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

Hanzo

Chat eDiscovery, Reimagined: Why Gen AI is the Smarter Way to Handle Chat Data

Hanzo on

Imagine searching for a crucial conversation in a sea of endless chat messages—messages filled with greetings, status updates, and casual banter. The reality of modern enterprise communication is an overwhelming flood of...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Bradley Arant Boult Cummings LLP

HHS Security Rule NPRM Proposes Makeover for Administrative Safeguard Compliance for Regulated Entities

In this week’s installment of our blog series on the U.S. Department of Health and Human Services’ (HHS) HIPAA Security Rule updates in its January 6 Notice of Proposed Rulemaking (NPRM), we are exploring the proposed updates...more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Vinson & Elkins LLP

From Cloud to Compliance: Legal Essentials for Building and Operating AI-Ready Data Centers

Vinson & Elkins LLP on

Driven by the demand for AI-ready cloud infrastructure, the market cap for global data center construction, currently valued at more than $250 billion, is set to double in less than ten years, reaching half a trillion dollars...more

Walkers

Navigating trusts in a data driven world developments in Guernseys regulatory landscape

Walkers on

We explore what trustees need to be aware of when dealing with data and complying with their obligations under the Data Protection (Bailiwick of Guernsey) Law, 2017 and related legislation (the "DP Law")....more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

Ankura

The Rise of AI-Powered Cyber Attacks: How Indian Businesses Can Prepare

Ankura on

As the digital landscape evolves, so do the threats that accompany it. The rise of artificial intelligence (AI) has fundamentally transformed the nature of cybercrime, enabling attackers to execute more sophisticated and...more

Levenfeld Pearlstein, LLC

New Year, New State Data Privacy Laws

With the advent of a new year comes a new set of consumer data privacy laws in the United States. Five new state data privacy laws go into effect in January 2025, with additional laws coming throughout 2025 and into 2026....more

Wiley Rein LLP

Continued Remote Hiring Concerns in IT Sector: What to Look for in 2025 and How to Mitigate Business Risk

Wiley Rein LLP on

Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more

Ankura

Balancing Agility and Speed with Preparation and Stability: Importance of Governance in a Fintech Startup

Ankura on

In all our work with clients, my evaluation and expectations around compliance readiness come down to one point: Governance. This can mean a variety of things when it comes to a compliance program, but overall, we boil it...more

Vinson & Elkins LLP

[Webinar] Cybersecurity for the C-Suite - December 5th, 12:00 pm - 1:00 pm CT

Vinson & Elkins LLP on

Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more

Alston & Bird

The Digital Download – Alston & Bird’s Privacy & Data Security Newsletter – November 2024

Alston & Bird on

Publications & Advisories - November 2024 – Kathleen Benway, Jennifer Everett, Alysa Austin, and Kristen Bartolotta published “Federal Trade Commission’s Updated Health Breach Notification Rule Is Now in Effect” in Employee...more

Alston & Bird

Combatting the New Insider Threat: North Korean IT Workers Posing as Remote Employees

Alston & Bird on

The New York Department of Financial Services issued a cybersecurity advisory on November 1, 2024, regarding a growing threat posed by North Korean operatives seeking remote IT roles at U.S. companies. These operatives secure...more

Sheppard Mullin Richter & Hampton LLP

Amendments to NYDFS’ Cybersecurity Regulations Take Effect November 1

The New York Department of Financial Services has modified its cybersecurity requirements for regulated entities. These requirements are in addition to those included in the regulations as last updated in November of last...more

Skadden, Arps, Slate, Meagher & Flom LLP

Navigating the New Cybersecurity Landscape: Key Implications of the EU’s NIS 2 Directive

The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more

Foley & Lardner LLP

National Public Data Hack Exposes Millions: Essential Steps to Safeguard Your Identity and Combat Fraud

Foley & Lardner LLP on

The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more

254 Results
 / 
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide