News & Analysis as of

Data Security

A&O Shearman

US, Australian, New Zealand and UK cybersecurity agencies publish guidance on best practices for securing data used to train and...

A&O Shearman on

On May 22 2025, the cybersecurity agencies from the US, UK, Australia, and New Zealand published a Cybersecurity Information Sheet (CIS) on ensuring that data used to train and use artificial intelligence (AI) and machine...more

Baker Donelson

DOJ Final Rule Casts Wider Net: Common Business Data May Now Trigger National Security Scrutiny

Baker Donelson on

If you thought your company's collection of email address, IP address, zip code, birth date, or cookie data was too mundane to catch the federal government's attention – think again. Effective April 8, 2025, a new DOJ final...more

Hogan Lovells

Using AI in International Arbitration: what parties and arbitrators need to think about

Hogan Lovells on

Artificial intelligence (AI) is transforming the legal world, from the use of AI-assisted document review to deployment of generative AI for research and submission drafting. Recognising the prevailing wind, many...more

King & Spalding

New Security Measures for Large Databases: When a DPA’s Directives Set Standards

King & Spalding on

In response to a record year of personal data breaches in 2024, affecting millions of individuals, the French data protection authority (CNIL) has published a set of security directives for operators of large databases. While...more

Robinson+Cole Data Privacy + Security Insider

Adidas and UChicago Sued Over Data Breaches Caused by Third-Party Vendors

What do a global sportswear giant and a prestigious medical center have in common? Apparently, a shared struggle defending data breach lawsuits for breaches of sensitive personal information caused by third-party vendors....more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

PilieroMazza PLLC

Cybersecurity Compliance in the Crosshairs: Raytheon’s $8.4 Million FCA Settlement and What It Means for Defense Contractors

PilieroMazza PLLC on

Government contractors regularly handle sensitive federal data, and cybersecurity compliance is no longer optional—it’s mandatory. A recent settlement between the Department of Justice (DOJ) and defense contractor Raytheon...more

Accelerynt, Inc.

Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration

Accelerynt, Inc. on

The Posture Visibility Problem - CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such as publicly accessible storage, unencrypted assets, and overly permissive...more

HaystackID

Click. Notify. Exfiltrate. Why the Most Damaging Threats Start in Your Inbox

HaystackID on

Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more

Hogan Lovells

Malaysia enacts data sharing rules for public sector

Hogan Lovells on

With the introduction of the Data Sharing Act 2025 (the “Act”), Malaysia has formalised the rules governing the sharing of data between its public sector agencies. Designed to foster greater collaboration and efficiency, the...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Ius Laboris

Implementing AI Guidelines in Hong Kong

Ius Laboris on

Hong Kong’s Privacy Commissioner for Personal Data (PCPD) recently published Guidelines for the Use of Generative AI by Employees. We look at the key points contained in the Guidelines below....more

Hinshaw & Culbertson - Privacy, Cyber & AI...

AI Moratorium, Bulk Data Controls, and Enforcement Trends

To help our clients and readers sort through the volume of privacy, cyber, and AI news, we are switching Privacy, Cyber, & AI Decoded to a summary format. In this first edition, we look at a proposed 10-year moratorium on...more

White & Case LLP

Arbitration and AI

White & Case LLP on

Use of AI is expected to grow significantly over the next five years, driven by the potential for efficiencies. Principal current uses of AI include factual and legal research, data analytics and document review. AI...more

Venable LLP

A Closer Look at the Data Security Requirements in DOJ's Bulk Data Rule

Venable LLP on

As described in an earlier alert, the Department of Justice (DOJ) recently announced a 90-day pause in enforcement of the "Bulk Data Rule" for entities engaging in good faith compliance. That 90-day grace period ends on July...more

Ward and Smith, P.A.

Cyber Liability Insurance: Is It Worth It?

Ward and Smith, P.A. on

In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more

Wiley Rein LLP

Wiley Consumer Protection Download (June 3, 2025)

Wiley Rein LLP on

Wiley also has launched a Trump Administration Resource Center and Resource Guide to track Executive branch priorities during the second Administration of President Trump. With Wiley’s deep-rooted understanding of Washington...more

Pagefreezer

What Is Swatting? And How Can You Prevent It?

Pagefreezer on

What happens when online harassment crosses the digital divide? For a decade, the practice of swatting has been on the rise, and featured in news stories the world over.  Swatting is a weaponized form of harassment that turns...more

Orrick, Herrington & Sutcliffe LLP

Nevada enacts new customer information safeguarding standards for financial services companies

On May 26, the governor of Nevada enacted SB 44 to impose new duties on financial services providers in Nevada, aligning state requirements for safeguarding customer information with FTC standards in its safeguards rule (16...more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

IR Global

Recursive Artificial Intelligence: Can the Law Keep Up?

IR Global on

While Artificial Intelligence (AI) has emerged as groundbreaking and significantly impacting various sectors and enhancing quality of life, the chasm between technological advancements and the law is growing by the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - May 2025

Robinson & Cole LLP on

CYBERSECURITY - U.S. Retailers Bracing for Scattered Spider Attacks - Google sent out a warning that the cybercriminal group Scattered Spider is targeting U.S.-based retailers. Scattered Spider is believed to have been...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #445 – Apple Users: Update to iOS 18.5

Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more

Conn Maciel Carey LLP

Navigating Legal Risk in the Remote Work Era

Conn Maciel Carey LLP on

The widespread adoption of remote work arrangements has reframed the employment landscape, offering organizations access to a broader talent pool and increased operational flexibility. However, this reorganization also...more

White & Case LLP

AI Watch: Global regulatory tracker - China

White & Case LLP on

The Interim AI Measures is China's first specific, administrative regulation on the management of generative AI services. Laws/Regulations/National Standards directly regulating AI (the "AI Regulations") The Cyberspace...more

8,698 Results
 / 
View per page
Page: of 348

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide