News & Analysis as of

Cybersecurity Software

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Clark Hill PLC

How does Executive Order 14306 shift the cyber strategy for government contractors?

Clark Hill PLC on

On June 6, a new Executive Order (EO) on cybersecurity altered the compliance landscape for federal contractors. The order pauses the imminent requirement for software vendors to formally attest compliance with the Secure...more

Mogin Law LLP

DOJ Antitrust Division Reviewing Google-Wiz Deal

Mogin Law LLP on

The Justice Department’s Antitrust Division is reviewing Google’s planned $32 billion acquisition of Wiz Inc. to determine if the combination would illegally limit competition in the cloud security marketplace, according to a...more

Latham & Watkins LLP

Cybersecurity Regulation in Flux as Trump Administration Focuses on Evolving Foreign and Tech Threats

Latham & Watkins LLP on

The administration has signaled a potential softening of cyber regulation for domestic entities, with increasing focus on national security priorities and preparing for the future....more

Mintz - Venture Capital & Emerging Companies...

MintzTech Connect: All Things Technology — July 2025

Coworker.ai has recently announced the launch of the world’s first AI “teammate,” an agent that can perform complex work at the level of an experienced colleague. Powered by Organizational Memory (OM1), a proprietary memory...more

Polsinelli

A New Executive Order Signals Administration’s Cybersecurity Priorities

Polsinelli on

Key Takeaways - President Trump’s new cybersecurity Executive Order largely retains the structure and goals of EO 14144 but rolls back several deadlines and prescriptive directives to give agencies more flexibility....more

Hogan Lovells

FDA finalizes cyber device “select updates” guidance, potentially affecting substantial equivalence findings for 510(k)s

Hogan Lovells on

The U.S. Food and Drug Administration (FDA) recently finalized its March 2024 select updates to its guidance "Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions” (“Premarket...more

Goodwin

The Devil’s in the Details: Executive Order on Cybersecurity Reveals Administration’s Focus on AI-Cyber Convergence, Secure...

Goodwin on

On June 6, 2025, President Trump issued an Executive Order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (the “Order”). The measure...more

Gardner Law

FDA Finalizes Cybersecurity Premarket Guidance: What It Means for Medical Device Makers

Gardner Law on

The FDA has finalized its guidance on cybersecurity for medical device premarket submissions, providing additional insight into the agency’s expectations for how manufacturers integrate cybersecurity risk management into...more

Quarles & Brady LLP

Trump Reverses Key Biden-Era Cyber Directives: Important Updates to Federal Cybersecurity Priorities

Quarles & Brady LLP on

Earlier this month, President Trump issued an Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), which amends both Biden...more

Woodruff Sawyer

Managing Your Supply Chain Cyber Risk

Woodruff Sawyer on

Most organizations rely on complex supply chains, and that reliance has become a point of vulnerability for cyberattacks. This spring, we have witnessed a large-scale cyberattack on a major British multinational retailer due...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

A&O Shearman

Trump White House issues executive order on cybersecurity

A&O Shearman on

While the Order preserves significant portions of President Biden’s most recent cyber executive order—including provisions aimed at securing the software supply chain, federal government systems, and federal...more

Wiley Rein LLP

President Trump’s Cyber Mandate: Analysis of Executive Order on Strengthening U.S. Cybersecurity

Wiley Rein LLP on

President Trump issued a cybersecurity Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity” (Trump EO), along with a corresponding Fact Sheet on June 6, 2025. The Trump EO clears some of the...more

Alston & Bird

Trump Administration Releases Cyber Executive Order Revealing Renewed Strategy for U.S. Cybersecurity

Alston & Bird on

On June 6, 2025, President Trump issued an Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity, amending certain prior directives established by the Biden and Obama administrations....more

McCarter & English Blog: Government Contracts...

The Need for Speed: DoD’s “Software Fast Track” Targets Bureaucracy at Mach 2

The Department of Defense (DoD) is revving its engines again—this time to rocket past its own software acquisition drag. Launched via an April 24 memo from Acting DoD CIO Katie Arrington, the DoD’s Software Fast Track (SWFT)...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Jenner & Block

Client Alert: White House Narrows and Refocuses Biden Executive Order on Strengthening Federal Cybersecurity

Jenner & Block on

On June 6, 2025, President Donald J. Trump signed a new executive order on “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (“Trump Cyber EO”),...more

Sheppard Mullin Richter & Hampton LLP

Trump’s New Cybersecurity Executive Order: What Contractors Need to Know

On June 6, 2025, the Trump Administration released a new Executive Order (“EO”) on cybersecurity, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order...more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

Hogan Lovells

Threat actors increasingly introducing malicious code into open source packages

Hogan Lovells on

The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more

Hogan Lovells

Australia’s Model Clauses provide framework for AI procurement

Hogan Lovells on

On 17 March 2025, the Australian Government published Model Clauses to help government purchasers manage vendor relationships when procuring AI technology based systems and services. The Model Clauses cover issues relevant to...more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #445 – Apple Users: Update to iOS 18.5

Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

380 Results
 / 
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide