A collection of new laws signed by Pennsylvania Gov. Josh Shapiro during this year’s budget process make important amendments to the Public School Code affecting all school entities. Among them is Act 55 of 2024, which...more
It was great to read MSBA Leads the Way in Advocating for Judicial and Attorney Security | Maryland State Bar Association (July 30, 2024), written by the MSBA President, Raphael J. Santini....more
Inadequate security measures may cause or contribute to crime in stores, apartments, offices, hotels, motels, and entertainment venues. Criminals might take advantage of...more
On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework 2.0 (CSF 2.0). CSF 2.0 represents the first major update to the Cybersecurity Framework, which was...more
Government reporting contains no shortage of signals that threat actors, including traditional terroristic actors, are eager to disrupt global shipping and supply chains. This threat environment of frequent negative headlines...more
On January 31, 2024, OSFI released its finalized Integrity and Security Guideline (“Guideline”). The Guideline is a result of the extension of OSFI’s mandate, as of January 1, 2024, to include the oversight of integrity and...more
Mozilla recently released security updates to address known vulnerabilities in their Thunderbird and Firefox products. The Cybersecurity & Infrastructure Security Agency (CISA) is recommending that the patches be applied...more
After considerable anticipation and speculation, President Biden recently issued an Executive Order (EO) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While the EO focuses primarily on...more
The AI executive order moves the U.S. closer to a broader unified approach on federal AI regulation, expanding on the AI Bill of Rights and NIST AI Risk Management Framework and focusing on the responsible development and...more
On October 30, 2023, President Biden signed a first-of-its-kind executive order entitled, "Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence" ("AI")....more
On October 30, 2023, President Biden issued an “Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence” designed to spur new AI safety and security standards, encourage the development of privacy-preserving...more
The FCC and House of Representatives have begun discussions on the safety and security of IoT modules from China. The FCC adopted a Notice of Proposed Rulemaking to create an Internet of Things (IoT) cybersecurity labeling...more
AI may be both the most “powerful capability of our time” and the “most powerful weapon of our time." That’s according to Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency, when interviewed...more
The People’s Republic of China’s Regulations on the Administration of Deep Synthesis of Internet Information Services (Regulations) entered into force on 10 January 2023, following their adoption by the Cyberspace...more
Crypto is dead or on life support, waiting for regulation to rid it of ‘crypto contagion.’ Meanwhile, blockchain technology – the virtual, public ledger technology that records crypto transactions – is very much alive, as...more
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more
The Association for Uncrewed Vehicle Systems International (AUVSI), the world’s leading trade association for drones and other autonomous vehicles, announced a collaboration with the Department of Defense’s (DOD) Defense...more
Consistent with the increased safety protections that we have seen put in place in the hotel industry for hotel workers throughout California over the past few years, the City of Los Angeles recently passed an Ordinance to...more
Why are you operating your physical security program? What threats are you trying to protect against? What specific risks to your organization and enterprise are you trying to mitigate? If you cannot quickly and...more
As the COVID-19 pandemic appears to be entering the endemic phase, organizations are turning their attention to onsite collaboration and physical interaction among staff members, many of whom have been working remotely for...more
The Department of Health and Human Services (“HHS”) has issued a formal request for information from the public about how regulated entities are implementing industry recognized security practices. The request for information...more
Covered entities and business associates subject to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) have the chance to provide input on two amendments to the Health Information Technology for...more
The Federal Government continues ramping up enforcement of data security requirements by deploying significant new enforcement theories and tools in support of cyber and data security controls required by federal law....more
Last month, on Data Privacy Day, Colorado’s Attorney General Philip Weiser released prepared remarks entitled “The Way Forward on Data Privacy and Data Security” that shed some light on his approach to enforcing Colorado’s...more
As if health care entities don’t have enough to worry about during this chaotic and difficult time in the pandemic, a new report released by Cynerio, entitled “The State of IoMT Device Security 2022,” provides a list of...more