News & Analysis as of

Information Technology

Barnea Jaffa Lande & Co.

DORA for Tech Vendors - What You Should Know (But Haven’t Asked)

DORA (Digital Operational Resilience Act) is an EU regulation that sets rules for how financial entities manage ICT (Information and Communication Technology) risks. It covers areas like cyber resilience, incident reporting,...more

Holland & Knight LLP

DOD Secretary Directs Limitation of IT Consulting and Advisory Services Contracts

Holland & Knight LLP on

Contractors Should Seek to Distinguish Themselves in More Competitive Environment - The U.S. Department of Defense (DOD) on May 27, 2025, issued a memorandum implementing Executive Order (EO) 14222. As Holland & Knight...more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Holland & Knight LLP

DOD Secretary Directs Limitation of IT Consulting and Advisory Services Contracts

Holland & Knight LLP on

The U.S. Department of Defense (DOD) on May 27, 2025, issued a memorandum implementing Executive Order (EO) 14222. As our team previously summarized, EO 14222 implemented the Department of Government Efficiency's (DOGE) "cost...more

Association of Certified E-Discovery...

[Webinar] Beyond Cleanup: Turning Defensible Data into AI-Ready Insights - June 12th, 10:00 am PDT

You’ve cleaned up your data—now what? In the second part of this two-part webinar based on an actual case study, we’ll explore the next frontier: turning that defensible, well-managed data into a launchpad for AI-driven...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Dickinson Wright

Cyber Risk, Real Consequences: DOJ Steps Up Enforcement

Dickinson Wright on

Government efforts to enforce cybersecurity control requirements have moved forward in the opening months of the Trump administration. Regardless of the changes coming to other areas of contracting and the Federal Acquisition...more

Holland & Knight LLP

New Executive Action Aims to Streamline Environmental Reviews Through Digital Modernization

Holland & Knight LLP on

The Trump Administration has issued a Presidential Memorandum, "Updating Permitting Technology for the 21st Century," aimed at modernizing and streamlining the federal environmental review and permitting processes through...more

EDRM - Electronic Discovery Reference Model

[Webinar] Down the Rabbit Hole: Navigating IP Theft Investigations - May 29th, 1:00 pm - 2:15 pm ET

Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

U.S. Legal Support

Cybersecurity’s Role in Legal Transcription

U.S. Legal Support on

Legal transcription services play a vital role in legal matters, ensuring that live oral arguments and other audio or video content are fully accessible to all stakeholders in text. When managing transcription...more

McDermott Will & Emery

Risk Management in the Modern Era of Workplace Generative AI

Generative artificial intelligence (GenAI) is becoming more prevalent in the workplace, including as a tool for human resources (HR) leaders to use in their employment practices. At the same time, close to a dozen states have...more

Guidepost Solutions LLC

Unlocking Opportunity: Navigating the New Data Center Validated End User Program

Recently, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) published a significant interim final rule (IFR) that has created both challenges and exciting opportunities for these operators. This IFR...more

Carlton Fields

FINRA’s Blueprint for the Metaverse

Carlton Fields on

In October 2024, FINRA released its blueprint for the securities industry’s use of the metaverse — the metaverse report. The metaverse, often framed as “the next evolution of today’s internet,” is a loosely defined term used...more

Troutman Pepper Locke

The Least Known Risk in the Energy Sector: The “ICTS” National Security Rules

Troutman Pepper Locke on

There are unprecedented risks and opportunities emerging for companies in the energy sector as the Trump administration’s priorities start to come into focus. Many of those are well-known to the industry. Here’s one that’s...more

Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

Association of Certified E-Discovery...

[Webinar] Bridging Legacy Data, Defensible Disposition, and AI-Driven Insights - May 15th, 10:00 am PDT

Organizations face mounting challenges when it comes to managing legacy data across outdated platforms while meeting evolving legal and compliance demands. In this two-part webinar based on an actual case study, we’ll explore...more

Wiley Rein LLP

GSA Announces “OneGov Strategy” to Further Administration’s Focus on Commercial Acquisitions and Consolidation of Purchasing

Wiley Rein LLP on

WHAT: On April 29, 2025, the U.S. General Services Administration (GSA) announced its OneGov Strategy for IT purchases. According to the announcement, “[t]he strategy calls for deeper, direct engagement with [Original...more

Husch Blackwell LLP

Executive Order 14240 Shifts Information Technology Purchasing to GSA

Husch Blackwell LLP on

President Trump’s Executive Order (EO) 14240 (Mar. 20, 2025) provides for the General Services Administration (GSA) Administrator to assume responsibility for all Government-wide contracts for the acquisition of information...more

Morgan Lewis - Tech & Sourcing

Global Capability Centers: The Next Gen of Delivery Models

2025 has seen a notable push by companies to establish dedicated capability centers—or global capability centers (GCCs)—in countries with lower-cost resources and access to a strong talent pool. According to S&S Insider, the...more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Mitigation Strategies

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Key Risk Takeaways

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more

Davis Wright Tremaine LLP

FedRAMP 20x Initiative Promises Major Changes for Federal Cloud Service Providers

Major changes are coming again to the Federal Risk and Authorization Management Program ("FedRAMP"), the federal government's cybersecurity authorization program for cloud service providers ("CSPs")....more

Whiteford

Client Alert: New Maryland Sales Tax on IT Services, Capital Gains and More

Whiteford on

Just before the close of the 446th legislative session, the Maryland General Assembly passed and sent to Governor Moore HB 352/SB 321, the Budget Reconciliation and Financing Act of 2025 (the “BRFA”). The BRFA, which Gov....more

2,005 Results
 / 
View per page
Page: of 81

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide