News & Analysis as of

Risk Mitigation Data Security

Mitratech Holdings, Inc

The 2025 TPRM Study: Key Findings and Recommendations

The 2025 Mitratech Third-Party Risk Management (TPRM) Study conveys a clear message: the third-party risk landscape is evolving into a complex, interconnected ecosystem — one where every vendor, supplier, and partner plays a...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Esquire Deposition Solutions, LLC

How AI Is Helping Corporate Legal Departments

According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more

Guidepost Solutions LLC

[Webinar] Data Under Watch: Navigating DOJ’s New Rules on Sensitive U.S. Data Transfers - June 26th, 1:00 pm ET

Starting July 9, 2025, the U.S. Department of Justice will begin enforcing its new “Bulk Sensitive Data Rule,” a sweeping regulation aimed at restricting the transfer and storage of sensitive U.S. personal and...more

Strafford

[Webinar] AI and the Legal Industry: Ethical Issues, Privacy/Security Considerations, Best Practices for Using AI - Navigating...

Strafford on

This CLE webinar will guide counsel on navigating the challenges when using AI in the practice of law. The panel will address ethical issues and privacy and security considerations. The panel will also offer best practices...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Troutman Pepper Locke

How Cos. Can Use Data Clean Rooms to Address Privacy

Troutman Pepper Locke on

Businesses are constantly seeking innovative ways to improve their customers’ experiences. Originally published in Law360 - February 10, 2025....more

Accelerynt, Inc.

How Over-engineered Security Stacks Are Killing Agility—And What to Do About It

Accelerynt, Inc. on

Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more

Lathrop GPM

New DOJ Limits on Cross-Border Data Transfers Prompt Assessment by Businesses

Lathrop GPM on

On April 8, the National Security Division of the U.S. Department of Justice’s (DOJ) new rule on cross-border data transfers takes effect. It restricts U.S. businesses from transferring certain bulk sensitive personal data to...more

Fisher Phillips

Artificial Intelligence for the Safety Professional – Benefits, Risks, and Legal Implications

Fisher Phillips on

Artificial Intelligence (AI) is rapidly transforming all aspects of the work environment, including the workplace safety sector. As your organization strives to minimize workplace accidents, improve safety protocols, and...more

Seyfarth Shaw LLP

Cybersecurity In Construction: How To Effectively Mitigate Cyber Risk

Seyfarth Shaw LLP on

The construction industry’s reliance on digital data and devices has reshaped the construction process. When used properly, digital technology facilitates collaboration and increases productivity. However, growing dependence...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #434 – Use of GenAI Tools Escaping Corporate Policies

According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more

Faegre Drinker Biddle & Reath LLP

The Wallet Inspectors: The DPRK’s Sophisticated Campaign to Steal Cryptocurrency and How to Protect Yourself

On February 21, 2025, Bybit, one of the world’s largest cryptocurrency exchanges, suffered a cyberattack resulting in the theft of approximately $1.5 billion in Ethereum tokens.  This attack marked a new pinnacle in the...more

Harris Beach Murtha PLLC

AI-Powered Video Game Advertising: Regulatory and IP Challenges

AI is coming for digital advertising in video games. AI-driven technologies now enable the integration of dynamic, personalized advertisements within gaming environments, enhancing player engagement and offering lucrative...more

Mitratech Holdings, Inc

Building an HR Tech Stack for Consulting Firms

The need for an effective HR Tech Stack in consulting has never been more critical. With firms competing for top talent, having a well-structured and efficient HR system can make a huge difference....more

Dorsey & Whitney LLP

Artificial Intelligence Launching Agentic AI in an Uncertain U.S. Regulatory Landscape

Dorsey & Whitney LLP on

Within its first few days, the new administration revoked the 2023 Executive Order on Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (the “Old AI Executive Order”) – which had been intended to...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

The Volkov Law Group

Embracing Generative AI — The Current Risk Profile (Part II of II)

The Volkov Law Group on

When evaluating AI risks, legal, ethics and compliance professionals need to divide the question into two — first, what are risks from legal, ethics and compliance internal use of AI? and second, what are business risks from...more

Alston & Bird

UK’s National Cyber Security Centre Releases 2024 Annual Review

Alston & Bird on

The United Kingdom’s National Cyber Security Centre (NCSC) has released its Annual Review for 2024. As in prior years, the report covers the UK’s cyber security position, both in terms of threats to the public and private...more

Mitratech Holdings, Inc

Building An HR Tech Stack for Higher Education

Mitratech Holdings, Inc on

The need for an effective HR Tech Stack in higher education has never been more critical. With more families looking at college costs, having a great staff can make a huge difference....more

Integreon

On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response

Integreon on

Cyber breach costs are skyrocketing, and it is crucial for both insureds and insurers to stay on top of cyber incident response. ?? Ensure your incident response plan is robust ?? Avoid the volatile costs of dealing with...more

Mintz - Antitrust Viewpoints

Senators Hold Hearing on AI Fraud and Scams, Vow to Pass AI Bills in Coming Weeks — AI: The Washington Report

On November 19, the Senate Commerce Committee’s Subcommittee on Consumer Protection, Product Safety, and Data Security convened a hearing on “Protecting Consumers from Artificial Intelligence Enabled Fraud and Scams.” The...more

U.S. Legal Support

Challenges in Medical Record Management & Retrieval

U.S. Legal Support on

Medical record retrieval is critical to a wide variety of legal disputes. These include cases directly about healthcare-related concerns alongside others that could depend on facts proven through the types of medical records...more

Mayer Brown

Communications in a Cyber Incident – Guidance

Mayer Brown on

The UK National Cyber Security Centre has published guidance on effective communications in a cyber incident. While targeted at organisations generally, rather than explicitly at pension scheme trustees, the guidance contains...more

354 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide