News & Analysis as of

Data Security Microsoft

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

Lowenstein Sandler LLP

Active and Critical Security Concern for SharePoint

Lowenstein Sandler LLP on

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Troutman Pepper Locke

Cleared for Takeoff? Copilot Legal and Technical Preflight Checklist

Troutman Pepper Locke on

Millions of companies use the Microsoft 365 suite of tools every day to create, communicate, and collaborate, but far fewer have adequately grappled with the legal risks introduced by Copilot, the powerful generative AI...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Benesch

AI Reporter - May 2025

Benesch on

The use of AI in banking was a topic in April, as Bank of America revealed it will spend $4 billion on AI initiatives in the coming year. The bank cited AI’s usefulness in reducing IT support calls and the over 90% usage...more

Epiq

Navigating Copilot Adoption: Key Legal Considerations for Data Governance

Epiq on

Legalweek 2025 Session Recap - The widespread interest in AI for users’ personal and professional lives has driven significant demand for tools like Copilot for Microsoft 365. However, the implementation of any AI tool...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #436 – Microsoft Warns of Crypto Wallet Scanning Malware StilachiRAT

A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Ankura

The Evolution of Password Management

Ankura on

In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more

Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

Hanzo

AI Doesn’t Automatically Get the Gold: The Mixed Bag of Olympic AI Ads

Hanzo on

Watching the Olympics has been a thrilling ride, with jaw-dropping athletic feats and heartwarming displays of sportsmanship. But amidst this celebration of human excellence, the barrage of AI ads has been a mixed bag. While...more

Robinson+Cole Data Privacy + Security Insider

Black Basta Exploits Microsoft Zero-Day After Patch

It is being reported that Black Basta (aptly named) exploited a Microsoft zero-day prior to Microsoft’s release of a patch for the vulnerability back in March....more

HaystackID

Microsoft Delays Recall Rollout Amid Privacy Concerns

HaystackID on

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

Opportune LLP

On-Prem Servers vs Azure Cloud: Choosing the RightAngle…

Opportune LLP on

In today's digital landscape, businesses face a choice when implementing RightAngle, do they use their existing on-prem servers and infrastructure, or do they create a new infrastructure and provision servers for the...more

Lighthouse

Microsoft Copilot for M365: 4 Readiness Considerations for Legal and eDiscovery Teams

Lighthouse on

Enterprise adoption of new technology has always impacted legal and eDiscovery teams. Microsoft Copilot for Microsoft 365, Microsoft’s flagship generative AI tool, is no different. While it promises to increase workplace...more

Hogan Lovells

Security Snippets: Microsoft SharePoint vulnerability to watch out for

Hogan Lovells on

A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more

WilmerHale

FTC Publishes Proposed Amendments to COPPA Rule

WilmerHale on

On December 20, the Federal Trade Commission (FTC or “the Commission”) published a notice of proposed rulemaking (NPRM) proposing amendments to the Children’s Online Privacy Protection Rule (the “COPPA Rule” or the “Rule”)....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #373 – If you Use Windows Copilot —Configuration Update Issued by Microsoft This Week

On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2  (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more

White & Case LLP

AI Legal News Summer Roundup: Edition 3

White & Case LLP on

Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more

Accelerynt, Inc.

Best Patch Management Strategy for Remote Workers

Accelerynt, Inc. on

Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more

Fenwick & West LLP

Launch of Public RFI Signals FTC Scrutiny of Cloud Computing Industry

Fenwick & West LLP on

On March 22, 2023, the Federal Trade Commission (FTC) announced a request for information (RFI) seeking public comments on business practices in the cloud computing industry. The RFI focuses on three intertwined aspects of...more

HaystackID

[Webcast Transcript] Now You See It, Now You Don’t: eDiscovery Challenges and Apple’s iOS 16 Release

HaystackID on

Editor’s Note: On October 19, 2022, HaystackID shared an educational webcast on the potential impact of Apple’s iOS 16 release on the area of eDiscovery. With iOS 16, new chat manipulation and security features have gone...more

64 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide