News & Analysis as of

Technology Cybersecurity Data Security

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

Robinson+Cole Data Privacy + Security Insider

WhatsApp Patches Vulnerability That Facilitates Remote Code Execution

WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more

Clark Hill PLC

The Learned Concierge - April 2025, Vol. 18

Clark Hill PLC on

Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries. ...more

Morris, Manning & Martin, LLP

Charting a Human-Centered Future in the Age of Artificial Intelligence: Part Two

The Historical Context of Technological Revolutions - “I think that human beings have gotten as far as we've gotten because of our adaptability, our ability to adapt, and our ability to dovetail our technologies - our brains...more

Mitratech Holdings, Inc

5 Common Pitfalls in IT Disaster Recovery (and How to Avoid Them)

Even the strongest IT/DR plans can fail if they aren’t proactive about avoiding these common mistakes. When systems go down, business grinds to a halt. Downtime leads to $9,000 in losses per minute on average, damaged...more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

Faegre Drinker Biddle & Reath LLP

What’s New with FINRA’s Recent 2025 Regulatory Oversight Report

2025 is here, and so is FINRA’s 2025 Annual Regulatory Oversight Report (Report). On January 28, 2025, FINRA published the Report, which provides firms with insight into FINRA’s findings from recent observations and...more

NAVEX

Artificial Intelligence and Compliance: Preparing for the Future of AI Governance, Risk, and Compliance 

NAVEX on

Artificial Intelligence has rapidly moved from theoretical to transformational, profoundly changing how businesses operate across industries. While the benefits of AI, particularly Generative AI (genAI), are monumental, these...more

ArentFox Schiff

Proposed Changes to the HIPAA Security Rule: What Regulated Entities Need to Know

ArentFox Schiff on

In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more

Bradley Arant Boult Cummings LLP

HHS’s Proposed Security Rule Updates Will Substantially Increase the Controls Needed to Comply with the Technical Safeguard...

In this week’s installment of our blog series on the U.S. Department of Health and Human Services’ (HHS) HIPAA Security Rule updates in its January 6 Notice of Proposed Rulemaking (NPRM), we are tackling the proposed updates...more

Polsinelli

Technology Transactions & Data Privacy - 2025 Report

Polsinelli on

It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

A&O Shearman

Business email compromise and invoice fraud – a duty of care on the innocent?

A&O Shearman on

The Western Australian District Court’s recent decision in Mobius Group Pty Ltd v Inoteq Pty Ltd1 highlights the potential consequence for the innocent party where fraudulent changes in bank details are sent from their...more

IR Global

The human touch - AI’s role in commerce - The Visionaries

IR Global on

The Productivity Paradox: Does more technology mean less growth? Is there scope to use AI in commercial contracts? Will it save time, or ultimately cost more time in review and pose greater risk?...more

Robinson+Cole Data Privacy + Security Insider

Department of Commerce Takes Lead in Addressing Risks from Connected Car Technology

As a Rhode Islander, I am a big fan of our former Governor and now Secretary of Commerce, Gina Raimondo. She has always had her eye on the ball of the rapidly developing data privacy and cybersecurity risks and threats to...more

BCLP

Hong Kong Unveils Proposals for First Cybersecurity Law

BCLP on

The Hong Kong Government recently submitted its proposed legislative framework to enhance protection of computer systems of critical infrastructure (“Proposal”) to the Legislative Council (“LegCo”) Panel on Security for...more

Venable LLP

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Venable LLP on

The Digital Operational Resilience Act (DORA) regulation is part of the European Union’s (EU) strategy to enhance the overall stability of the EU financial system by ensuring that financial entities are resilient to digital...more

NAVEX

The State of Cybersecurity for Small and Medium Businesses

NAVEX on

Fragile or volatile supply chains, increases in regulatory obligations and enforcement, natural disasters, inflation, political turmoil – all complicated issues for any business to navigate. Among the myriad business...more

Osano

[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity

Osano on

Artificial intelligence is going to transform how the world does business — and in order to harness that transformation for the better, businesses need to be proactive about mitigating risks. When it comes to managing AI risk...more

Benesch

Document Retention for Motor Carriers and Transportation Brokers

Benesch on

Transportation services providers are increasingly facing new technology-oriented threats in day-to-day business. Recent cyberattacks and the potential for serious disruption from threat actors have drawn the attention of the...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 1, January 2024

The Current Status of Privacy Laws Across the United States - Unlike the General Data Protection Regulation (GDPR) in the European Union (EU), the United States does not have a nationwide comprehensive data privacy law....more

J.S. Held

Inside the Healthcare Industry: Understanding Emerging Data Privacy & Security Risks and Regulations

J.S. Held on

According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 9, November 2023

The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more

A&O Shearman

UK – NCSC publishes guidance on shadow IT

A&O Shearman on

The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more

48 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide