News & Analysis as of

Third-Party Service Provider Supply Chain

A&O Shearman

Managing cyber risk under escalating threat and enforcement pressure

A&O Shearman on

Cyber law and practice have continued to evolve over the past 12 months. New laws and regulations have been unveiled or come into force, while enforcement authorities have sharpened their focus on issues including board...more

Freeman Mathis & Gary

A first look at NIST’s new cyber AI framework

Freeman Mathis & Gary on

The National Institute of Standards and Technology (NIST) recently released their initial preliminary draft of NIST IR 8596, also known as the Cybersecurity Framework Profile for Artificial Intelligence. This new...more

Morgan Lewis - Data Center Bytes

Contracting for Cloud Computing Capacity: Key Concerns for Customers

Cloud computing has been sold as elastic, on-demand access to virtually unlimited resources. However, the rapid growth of data-intensive and artificial intelligence–driven workloads has strained the availability of certain...more

Mitratech Holdings, Inc

Third-Party Data Breaches: What You Need to Know

A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Mayer Brown

We Have Been Hacked: Now What? Lessons for the Boardroom

Mayer Brown on

The almost daily prevalence of cyber-attacks has brought the issue of cybersecurity as a core governance responsibility to the front of mind of company boards. In 2024 alone, over 15 million cyberattacks were recorded...more

Cole Schotz

Third Party Agreement Considerations for Start Ups

Cole Schotz on

Once a company’s organizational documents are settled, the day-to-day aspects of the company’s operations must be addressed, specifically interactions with its suppliers and customers. Even though the company may be eager to...more

Jones Day

NY Department of Financial Services Signals Increased Scrutiny of Third-Party Technology Risk Management

Jones Day on

On October 21, 2025, the New York Department of Financial Services ("NYDFS") sent a letter to the executives and information security personnel at covered entities with new guidance for managing technology and data risks...more

DLA Piper

Singapore: Key Amendments to the Cybersecurity Act Now in Force

DLA Piper on

Since the enactment of Singapore’s Cybersecurity Act 2018 (Cybersecurity Act), Singapore’s digital economy has grown rapidly, and cyber threats have evolved at a remarkable pace. To address this shifting landscape, the...more

Constangy, Brooks, Smith & Prophete, LLP

Minor Breaches, Major Trouble: Why minor cyber incidents can lead to major legal fallout

When cyberattacks strike global giants, it’s front-page news. But what about the smaller breaches -- the ones that don’t make headlines? Increasingly, they’re making waves in courtrooms and regulatory enforcement agencies. ...more

Hogan Lovells

From Fulfilment to Finance: How AI is Reshaping Everyday Fraud for Businesses

Hogan Lovells on

Fraud isn't standing still. As everyday digital tools become more powerful, they are also making some of the oldest scams faster and harder to spot. Fraud isn’t standing still As everyday digital tools become more powerful,...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity resolutions for 2026

As 2025 comes to an end, there have been some valuable cybersecurity lessons for businesses. These involve vendor oversight, internal coordination, and incident response plans. Businesses should vow to address them in 2026 if...more

Constangy, Brooks, Smith & Prophete, LLP

Asahi cyberattack highlights risks to “operational technology”

Another type of cyber attack. Operations for Japan-based beverage giant Asahi Group Holdings recently shut down after a cyberattack, causing a ripple effect that extended far beyond its breweries. The incident forced...more

Guidepost Solutions LLC

How Organizations Can Strengthen Third-Party Vendor Oversight and Compliance

Guidepost Solutions LLC on

Organizations that rely on third-party vendors for critical operations face unique challenges in managing vendor risks. These external relationships are essential for operational success, but can also create vulnerabilities...more

Ward and Smith, P.A.

Trick or Treat Contracts: Avoiding AI Vendor Horror Stories

Ward and Smith, P.A. on

Ed. Note: This is the fifth article in our series, “Conjuring Competitive Advantage: An AI Spellbook for Leaders,” focused on unlocking AI for business with practical steps and insights. Read Part 1, Part 2, Part 3, and Part...more

Foley & Lardner LLP

Securing Digital Supply Chains: Confronting Cyber Threats in Logistics Networks

Foley & Lardner LLP on

On the Rise: Cyberattacks through the supply chain have increased by over 400% in recent years. Leaders need to take action. Enhance Third-Party Cybersecurity: Regularly audit suppliers’ cybersecurity practices and limit...more

Goodwin

Beyond the Perimeter: Securing OAuth Tokens and API Access to Thwart Modern Cyber Attackers

Goodwin on

OAuth tokens streamline access but create new vulnerabilities that threat actors are exploiting. Learn how to secure token infrastructure through robust monitoring, governance, and vendor management....more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains in a Rapidly Evolving Cyber...

Foley & Lardner LLP on

Manufacturing supply chains have become high‑value targets for cybercriminals, facing relentless attacks as the industry remains the most targeted sector for the fourth consecutive year. Supply chain-related attacks have...more

Mitratech Holdings, Inc

Enterprise Risk Management Explained: The (In)Complete Guide

Mitratech Holdings, Inc on

Imagine discovering that half your vendors haven’t been evaluated in a year — or realizing that AI usage across your organization is growing faster than your governance framework can keep up. According to a recent study, this...more

A&O Shearman

FSB Publishes Report on Monitoring AI Adoption and Related Vulnerabilities in the Financial Sector

A&O Shearman on

The Financial Stability Board (FSB) has published a report examining how financial authorities can monitor the adoption of AI and assess related vulnerabilities. Building on its 2024 report and drawing on insights from a...more

Baker Botts L.L.P.

Shai-Hulud Worm: Key Considerations for Businesses Following npm Supply Chain Attack

Baker Botts L.L.P. on

A new cyber threat, the "Shai-Hulud" worm, has compromised the Node Package Manager (npm) ecosystem, which is widely used by organizations for JavaScript development. This attack has resulted in widespread theft of...more

Kohrman Jackson & Krantz LLP

Best Buy Launches Third-Party Marketplace to Broaden Consumer Access

In a significant strategic move, Best Buy has officially launched a new third-party online marketplace, integrating it into BestBuy.com and in the Best Buy App. This launch more than doubles the retailer’s online product...more

EDRM - Electronic Discovery Reference Model

Inside the Salesloft Drift Breach: Critical Lessons for SaaS Security and Governance

ComplexDiscovery Editor’s Note: The Salesloft Drift breach, which affected over 700 organizations between August 8–18, 2025, marks a defining moment in the evolution of SaaS-related supply chain attacks. With attackers...more

Warner Norcross + Judd

Data Breaches in the Supply Chain: The Risk, the Cost and What You Can Do to Protect Against Them

Warner Norcross + Judd on

Data breaches are increasing in frequency and cost for U.S. corporations, and businesses in the supply chain are often prime targets for bad actors. It’s critical for suppliers to understand the risk and costs of data...more

HaystackID

Inside the Salesloft Drift Breach: Critical Lessons for SaaS Security and Governance

HaystackID on

The Salesloft Drift breach that unfolded between August 8 and 18, 2025, represents one of the most significant supply chain attacks targeting Software-as-a-Service (SaaS) platforms in recent years. This sophisticated...more

61 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide