News & Analysis as of

Technology Cybersecurity

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Woods Rogers

Heightened U.S. Border Scrutiny Poses Increased Digital Privacy Risk for Entrants to U.S.

Woods Rogers on

Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more

Carlton Fields

No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion

Carlton Fields on

On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more

Robinson+Cole Data Privacy + Security Insider

WhatsApp Patches Vulnerability That Facilitates Remote Code Execution

WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more

Clark Hill PLC

The Learned Concierge - April 2025, Vol. 18

Clark Hill PLC on

Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries. ...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Malware Analysis Report on RESURGE Malware

On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more

Morris, Manning & Martin, LLP

Charting a Human-Centered Future in the Age of Artificial Intelligence: Part Two

The Historical Context of Technological Revolutions - “I think that human beings have gotten as far as we've gotten because of our adaptability, our ability to adapt, and our ability to dovetail our technologies - our brains...more

Mitratech Holdings, Inc

5 Common Pitfalls in IT Disaster Recovery (and How to Avoid Them)

Even the strongest IT/DR plans can fail if they aren’t proactive about avoiding these common mistakes. When systems go down, business grinds to a halt. Downtime leads to $9,000 in losses per minute on average, damaged...more

Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

GeoDataVision

Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory...

GeoDataVision on

In this podcast, the hosts discuss the importance of managing third-party risk for financial institutions. They highlight how institutions rely on external providers for technological innovation and operational support, but...more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

Bradley Arant Boult Cummings LLP

Hodl or Fold? The Insurance and Liability Minefield of Bitcoin for Business

Cryptocurrency isn’t just for tech startups and X (formerly Twitter) enthusiasts anymore. Mainstream corporations are increasingly forced to consider Bitcoin—the undisputed “king” of crypto—and other investments into digital...more

A&O Shearman

ICO publishes third edition of its Annual Tech Horizons Report

A&O Shearman on

On February 20 2025, the Information Commissioner’s Officer (the ICO) published the third edition of the Tech Horizons Report (the Report). The Report identifies four new technologies expected to emerge over the next 2 to 7...more

Baker Donelson

The Scarlet Shield Against Cyber Threats: Women Pioneering a Better Digital Future

Baker Donelson on

Imagine a world reminiscent of Barbie Land, where women are empowered as leaders in the fight against cyber threats. The International Women's Cyber Alliance (IWCA) is making this a reality, providing women and allies with...more

Faegre Drinker Biddle & Reath LLP

What’s New with FINRA’s Recent 2025 Regulatory Oversight Report

2025 is here, and so is FINRA’s 2025 Annual Regulatory Oversight Report (Report). On January 28, 2025, FINRA published the Report, which provides firms with insight into FINRA’s findings from recent observations and...more

Legal Internet Solutions Inc.

Top 10 WordPress Website Myths…DEBUNKED!

There are several common misconceptions about open-source website content management systems (CMS) that often lead law firms and businesses to hesitate before adopting them...more

Kilpatrick

5 Key Takeaways | Managing the Risks in Using Generative AI or How I Learned to Stop Worrying and Love AI

Kilpatrick on

Kilpatrick's Steve Borgman and Jordan Glassman recently presented on the various generative AI technologies available, with an emphasis on large language models such as ChatGPT (and others that are similar), at Kilpatrick’s...more

NAVEX

Artificial Intelligence and Compliance: Preparing for the Future of AI Governance, Risk, and Compliance 

NAVEX on

Artificial Intelligence has rapidly moved from theoretical to transformational, profoundly changing how businesses operate across industries. While the benefits of AI, particularly Generative AI (genAI), are monumental, these...more

ArentFox Schiff

Proposed Changes to the HIPAA Security Rule: What Regulated Entities Need to Know

ArentFox Schiff on

In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more

Bradley Arant Boult Cummings LLP

HHS’s Proposed Security Rule Updates Will Substantially Increase the Controls Needed to Comply with the Technical Safeguard...

In this week’s installment of our blog series on the U.S. Department of Health and Human Services’ (HHS) HIPAA Security Rule updates in its January 6 Notice of Proposed Rulemaking (NPRM), we are tackling the proposed updates...more

Polsinelli

Technology Transactions & Data Privacy - 2025 Report

Polsinelli on

It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more

Blake, Cassels & Graydon LLP

Prorogation du Parlement : L’incertitude plane sur diverses questions de la politique sur le numérique du gouvernement fédéral

Le 6 janvier 2025, la session parlementaire fédérale a pris fin lorsque la gouverneure générale du Canada a accepté la demande du premier ministre Trudeau de proroger le Parlement jusqu’au 24 mars 2025....more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

Perkins Coie

The FY 2025 National Defense Authorization Act: What’s New for Defense Contractors

Perkins Coie on

The recently passed National Defense Authorization Act (NDAA or Act) for Fiscal Year 2025 addresses recurring areas of focus relevant to defense contracting, including supply chain risks related to China, organizational...more

247 Results
 / 
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide