News & Analysis as of

Software Data Protection

Epiq

The Top Five Questions Legal Should Ask IT During Copilot for Microsoft 365 Adoption

Epiq on

It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce.   There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more

Mayer Brown

BIS Issues First ICTS Ban, Prohibiting Sales and Updates to Kaspersky Products and Services in the US, while OFAC Sanctions Senior...

Mayer Brown on

On June 20, 2024, the Department of Commerce's Bureau of Industry and Security (BIS) issued a Final Determination (“Determination”) prohibiting Kaspersky Lab, Inc.—the US subsidiary of the Russia-based antivirus software and...more

Orrick, Herrington & Sutcliffe LLP

A Customer Relationship Checklist for Cloud Providers, Including SaaS Companies, Operating in France

For more information about France’s SREN law, see our update that provides five key takeaways for businesses. Two new laws impose an array of obligations and restrictions on cloud providers in France. First, the European...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

Ward and Smith, P.A.

FTC: Three Enforcement Actions and a Ruling

Ward and Smith, P.A. on

In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more

Kohn, Kohn & Colapinto LLP

The Double-Edged Impact of AI Compliance Algorithms on Whistleblowing

As the implementation of Artificial Intelligence (AI) compliance and fraud detection algorithms within corporations and financial institutions continues to grow, it is crucial to consider how this technology has a twofold...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Seyfarth Shaw LLP

Surprising Plot Twist: The European Data Protection Supervisor Reprimands the European Union for its use of Microsoft 365

Seyfarth Shaw LLP on

The European Union (EU)’s government organizations are just like any another entity trying to function in a world where global companies and even government entities are reliant on digital platforms for messaging and...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Nextpoint, Inc.

eDiscovery for the Rest of Us: The Checklist Manifesto

Nextpoint, Inc. on

Nextpoint and Tom O’Connor published a new edition of eDiscovery for the Rest of Us, a strategic and tactical resource for legal teams navigating the modern ediscovery landscape. The 2024 version features new content,...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Furia Rubel Communications, Inc.

Embracing Data Privacy to Drive Business Growth with Aihong Yu, Chief Privacy Counsel of CDK Global

In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more

King & Spalding

Florida Digital Bill of Rights

King & Spalding on

On June 6, 2023, the Florida Digital Bill of Rights (“FDBR”) was signed into law, and goes into effect on July 1, 2024 with some exceptions—the prohibition of government-directed content moderation of social media platforms...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection - 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection: 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Husch Blackwell LLP

U.S. Privacy Litigation Update: December 2023

Husch Blackwell LLP on

Welcome to the ninth installment in our monthly data privacy litigation report, which we are releasing just after the New Year. We prepare these reports to provide updates on how courts in the United States have handled...more

Robinson+Cole Data Privacy + Security Insider

CISA Alerts Manufacturers to Eliminate Default Passwords

On December 15, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) issued a Secure by Design Alert and guidance on “How Manufacturers Can Protect Customers by Eliminating Default Passwords.”...more

Spilman Thomas & Battle, PLLC

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data?

As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?”, we are addressing the recent 9th Circuit decision in Jones v. Ford Motor Co. At issue in this matter...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

135 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide