News & Analysis as of

Software Information Technology

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Mitigation Strategies

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Key Risk Takeaways

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more

Accelerynt, Inc.

How Over-engineered Security Stacks Are Killing Agility—And What to Do About It

Accelerynt, Inc. on

Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more

Wiley Rein LLP

DOD Mandates Use of Software Acquisition Pathway for Software Development Procurements

Wiley Rein LLP on

WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more

Ankura

Optimizing Organizational Efficiency Through Tool Rationalization

Ankura on

In an era where technology drives business success, organizations often find themselves managing an overwhelming number of tools and applications — whether purchased officially through procurement or individually at a...more

Jackson Lewis P.C.

The Importance of Being Erroneous: Are AI Mistakes a Feature, Not a Bug?

Jackson Lewis P.C. on

No one intentionally sets out to make a mistake. Yet, it has long been recognized by some of our greatest innovators from Thomas Edison to Albert Einstein to Henry Ford that making mistakes (and learning from them) is the key...more

Epiq

How To Deploy LLMs Part 2: Public vs. Private

Epiq on

In Part 1 of our series, “How To Deploy Large Language Models (LLMs),” we discuss the risks associated with different deployment options. It is important to consider these risks, as they can significantly impact your...more

Hogan Lovells

Security Snippets: CISA publishes sector-specific cyber performance goals for IT and product design

Hogan Lovells on

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more

A&O Shearman

The EU Cyber Resilience Act - What You Need to Know

A&O Shearman on

The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more

Robinson+Cole Data Privacy + Security Insider

Cl0p Exploiting Cleo Software

According to Cyberscoop, the cyber gang Cl0p “has claimed responsibility for attacks tied to vulnerabilities in software made by Cleo, an Illinois-based IT company that sells various types of enterprise software.” The gang...more

Reveal

eDiscovery 101: Best Practices For Setting Up An eDiscovery Operation

Reveal on

eDiscovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. eDiscovery tools can also be...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Supply Chain Attacks in the UK: Reducing Risk and Preparing for Upcoming Legal Changes

Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more

Epiq

The Top Five Questions Legal Should Ask IT During Copilot for Microsoft 365 Adoption

Epiq on

It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce.   There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more

Wiley Rein LLP

Policy Patches: An Update on Software Security Regulation

Wiley Rein LLP on

So far, 2024 has been another very busy year for U.S. cybersecurity regulation. Among the top priorities has been software security, as we previewed early this year. Companies that sell software to the federal government or...more

Baker Botts L.L.P.

Spinning into Legal Trouble: Peloton Accused of Wiretapping in California Privacy Lawsuit

Baker Botts L.L.P. on

Like many organizations, Peloton is facing a legal challenge under the California Invasion of Privacy Act (CIPA) relating to the company’s alleged use of third-party technology on its website to intercept chat communications...more

K&L Gates LLP

Digital Operational Resilience in the Financial Services Sector: EU and UK Update

K&L Gates LLP on

With under six months to go until the European Union Digital Operational Resilience Act (DORA) becomes applicable on 17 January 2025, DORA implementation projects are running full steam ahead. DORA lays down uniform...more

Lowenstein Sandler LLP

New Prohibitions on Providing SaaS Services to Russia

In line with Group of Seven (G7) efforts to disrupt the Russian military-industrial base’s reliance on foreign IT systems, in June 2024 the U.S. Department of Commerce and the Department of the Treasury jointly issued new...more

Mitratech Holdings, Inc

After the Microsoft Outage: The Lingering Impact and Global Outlook on Business Continuity Planning (BCP)

In the aftermath of what could be one of the most widespread global information technology outages in history, organizations are putting a renewed focus on combating old vulnerabilities that can have cascading effects. ...more

EDRM - Electronic Discovery Reference Model

Bill Gates on the Next ‘Big Frontier’ of Generative AI: Programming Metacognition Strategies into ChatGPT

Bill Gates has insider knowledge on the future of generative AI. He predicts there will be ‘two more turns of the crank’ on scaling, with the next ‘big frontier‘ being ‘metacognition.’ Gates describes ChatGPT’s metacognitive...more

Houston Harbaugh, P.C.

The CrowdStrike® Global Tech Outage

Houston Harbaugh, P.C. on

On Friday July 19, 2024, CrowdStrike® Holdings, one of the largest cybersecurity technology companies in the world, announced that a faulty software update caused a global computer outage which ultimately disrupted many...more

CloudNine

Streamlining Data Collection in Modern eDiscovery

CloudNine on

As an eDiscovery software and services provider who has worked with hundreds of law firms, corporate legal and government teams over the past 20 years, we have learned ways to make the process of data collection for...more

Holland & Knight LLP

Commerce Department: Final Determination of Russia-Backed Cybersecurity, Antivirus Software

Holland & Knight LLP on

The U.S. Department of Commerce's Office of Information and Communications Technology and Services (OICTS) within the Bureau of Industry and Security (BIS) issued a Final Determination on June 20, 2024, pursuant to Executive...more

A&O Shearman

US imposes new sanctions and export controls against Russia

A&O Shearman on

On June 12, 2024, the U.S. Department of Treasury (Treasury), U.S. Department of State (State), and U.S. Department of Commerce (Commerce) announced another round of sanctions and export controls targeting Russia. In this...more

Wiley Rein LLP

New U.S. Sanctions and Export Controls on Russia Target Foreign Financial Institutions, Business Software, Critical Industries

Wiley Rein LLP on

The Biden Administration’s recent expansion of sanctions and export controls to counter Russian aggression will impact non-U.S. financial institutions and increase compliance risks for the business software sector and other...more

Morrison & Foerster LLP

The United States Imposes New Sanctions and Export Control Restrictions to Further Constrain Russia’s War Efforts, Including by...

On June 12, 2024, the United States took several hard-hitting sanctions- and export control-related actions intended to intensify pressure on the Russian government and hamper Russia’s ability to continue to support its war...more

129 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide