4 Key Takeaways | NY Sales Tax on Cloud-Based Document Management Services
Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more
The Justice Department’s Antitrust Division is reviewing Google’s planned $32 billion acquisition of Wiz Inc. to determine if the combination would illegally limit competition in the cloud security marketplace, according to a...more
Introduction: Understanding Cloud Data in the Modern Digital Landscape - In today’s hyper-connected digital world, we interact with vast amounts of data, much of which isn’t stored locally on our devices but instead...more
As the pace of advancements in artificial intelligence (AI) innovations continues to accelerate, companies from various technology and industry sectors are turning to ArentFox Schiff’s Patent group for guidance in protecting...more
In 2023, a data center experienced a complete power loss during a scheduled electrical grid maintenance. Less than five months later, that same facility faced another major power outage. However, this time the impact was...more
President Trump issued a cybersecurity Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity” (Trump EO), along with a corresponding Fact Sheet on June 6, 2025. The Trump EO clears some of the...more
The Posture Visibility Problem - CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such as publicly accessible storage, unencrypted assets, and overly permissive...more
According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
Major changes are coming again to the Federal Risk and Authorization Management Program ("FedRAMP"), the federal government's cybersecurity authorization program for cloud service providers ("CSPs")....more
The U.S. General Services Administration (GSA) recently announced plans to develop the Federal Risk and Authorization Management Program (FedRAMP) 20x – a new approach to the government-wide program for the security...more
The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more
On March 24, 2025, the Federal Risk and Authorization Management Program (“FedRAMP”) announced a major overhaul of the program, which is being called “FedRAMP 20x.” The FedRAMP 20x announcement stated there are no immediate...more
On Monday, March 24, 2025, the General Services Administration (GSA) launched FedRAMP 20x, as an effort to automate parts of the program and create collaboration with the industry to improve authorization process for cloud...more
FedRAMP Director Pete Waterman recently unveiled the “FedRAMP 20x” plan – a proposal designed to reimagine and reformulate the FedRAMP authorization process for federal government use of cloud-based products and services....more
The Middle East is experiencing a transformative surge in its data center industry, driven by digital transformation, the widespread adoption of cloud services, and strategic investments in artificial intelligence (AI). The...more
Infrastructure-as-a-Service (IaaS) is a vital model for law firms seeking better ways to organize eDiscovery data and streamline the discovery process. With thousands of documents and pieces of information to collect,...more
By one count, worldwide there were some 11,800 data centers in early 2024. Within that census are facilities so small that they fit in office building closets, while others are among the largest manmade structures on the...more
In what has been seen as an acknowledgement of the fundamental importance of data centres to the functioning of the UK economy and society, the UK Government has acted to designate data centres as ‘critical national...more
The court reporting industry is evolving rapidly, propelled by technological advancements and the increasing demand for efficiency in the legal sector. For 2025, trends such as artificial intelligence (AI), real-time...more
In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
In his final days in office, President Biden signed an ambitious executive order to improve the federal government's approach to cybersecurity. Executive Order 14114 ("Executive Order"), issued January 16, 2025, titled...more
Over the last few years, the Federal Risk and Authorization Management Program (“FedRAMP”) Program Management Office (“PMO”) has released two draft guidance documents related to defining the applicable boundary for security...more
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more