News & Analysis as of

Cybersecurity National Security Today's Popular Updates

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
A&O Shearman

Cybersecurity in mining: protecting infrastructure and digital assets

A&O Shearman on

The mining sector is increasingly at risk from cyber attacks, and many companies are racing to defend themselves against the backdrop of a rapidly changing threat landscape. Ross Phillipson and Anna Rudawski explore what is...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Hogan Lovells

The Cyber Security and Resilience Bill

Hogan Lovells on

On 1 April 2025, the UK Department for Science, Innovation and Technology issued a policy statement setting out its key proposals for the new Cyber Security and Resilience Bill. The Bill is intended to respond to an...more

Wiley Rein LLP

Update: DOJ and CISA Issue New National Security Program to Regulate Foreign Access to Sensitive Data

Wiley Rein LLP on

On January 8, 2025, the U.S. Department of Justice (Department or DOJ) issued new rules required by then-President Biden’s February 2024 Executive Order (EO) 14117 to establish a new regulatory framework aimed at “Preventing...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Hinckley Allen

Enforcement Outlook Under the Second Trump Administration: How Trump’s Priorities Will Impact White-Collar Enforcement Actions

Hinckley Allen on

With every change in administration, organizations and individuals face changes in the types of conduct the federal government focuses on in its investigations, enforcement, and criminal prosecutions. ...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Paul Hastings LLP

The Bybit Hack of 2025 — Potential Implications

Paul Hastings LLP on

On February 21, 2025, Dubai-based Bybit, one of the world’s leading cryptocurrency exchanges, suffered a massive security breach, resulting in the loss of approximately $1.5 billion in Ethereum (ETH). The incident, which is...more

Dacheng

DeepSeek and China’s AI Regulatory Landscape: Rules, Practice and Future Prospects

Dacheng on

During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more

StoneTurn

2025 and Cybersecurity: What is Your Strategy?

StoneTurn on

Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Robinson+Cole Data Privacy + Security Insider

Three States Ban DeepSeek Use on State Devices and Networks

New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Guidepost Solutions LLC

Regulatory Enforcement Trends in the New Administration and What They Mean for Your Company

As the Trump administration ushers in a new era of regulatory policy, businesses are closely monitoring shifts in enforcement trends. Understanding these changes is crucial for navigating the evolving regulatory landscape and...more

Wilson Sonsini Goodrich & Rosati

Ransomware Attacks: UK Government Proposes Ransom Payment Ban and Mandatory Notification Requirements

On January 14, 2025, the UK government unveiled a proposed framework aimed at combating the rise of ransomware attacks by implementing a payment prevention and reporting regime. This would require companies to not only report...more

BakerHostetler

The Next Secretary of Defense and National Security Priorities: What Companies Need to Know

BakerHostetler on

Pete Hegseth, during his Secretary of Defense (SECDEF) confirmation hearings, articulated several priorities that could have a significant impact on private industry in the United States. These priorities focused primarily on...more

Fox Rothschild LLP

Investments in Chinese Technology Companies Limited by New US Outbound Investment Rule

Fox Rothschild LLP on

U.S. investors interested in investing in advanced Chinese technology companies may now be constrained by the U.S. Government’s first-ever outbound investment rule (Final Rule) which took effect on Jan. 2, 2025. The Final...more

Goodwin

Access Restricted: DOJ Prohibits or Restricts Data Sharing with China, Russia, and Other Specified Countries

Goodwin on

On December 27, 2024, the US Department of Justice (DOJ) issued a final rule establishing a new national security program to prevent access to Americans’ bulk sensitive personal data and government-related data by China...more

Foley Hoag LLP - Security, Privacy and the...

U.S. House Report Addresses AI Concerns, Including Privacy and Data Security

Overall, the Report recognized the complex interplay between AI advancement and privacy/security concerns, advocating for a balanced approach that promotes innovation while protecting individual rights and national interests....more

Wiley Rein LLP

Wireless Roundup (January 2025)

Wiley Rein LLP on

FCC Seeks Comment on Proposed Requirements for Covered Text Providers Under the 988 Suicide & Crisis Lifeline: In this Third Further Notice of Proposed Rulemaking (FNPRM), the Federal Communications Commission (FCC) requests...more

Health Care Compliance Association (HCCA)

Privacy Briefs: November 2024

Change Healthcare Inc. has amended its initial breach report to the HHS Office for Civil Rights (OCR) to state that 100 million individuals were impacted by its mammoth ransomware attack and breach. However, as of Oct. 24,...more

Bradley Arant Boult Cummings LLP

Pentagon's cybersecurity rules reflect the growing threat from state-sponsored hackers

On October 11, 2024, the United States Department of Defense (DOD) published a final rule implementing its Cybersecurity Maturity Model Certification (CMMC) program, which is designed to verify that defense contractors are...more

Skadden, Arps, Slate, Meagher & Flom LLP

Navigating the New Cybersecurity Landscape: Key Implications of the EU’s NIS 2 Directive

The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more

Holland & Knight LLP

New Requirements for Research Security Programs Raise the Stakes for Compliance

Holland & Knight LLP on

The National Security Presidential Memorandum-33 (NSPM-33), issued in January 2021, directed federal agencies that fund research and development (R&D) projects to require certain "Covered Institutions" to certify that the...more

Morgan Lewis

AI, Privacy, and Foreign Investment: Top Congressional Investigation Trends for Technology Companies

Morgan Lewis on

The technology industry is squarely under Congress’s spotlight these days. Rapid advances in artificial intelligence (AI), electric vehicles, and green energy, as well as concerns over data security and privacy, foreign...more

273 Results
 / 
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide