Maryland's Sales Tax on IT and Data Services
No Password Required: Reginald “Andre” Andre, CEO of ARK Solvers and Builder of Human + AI-Driven Culture
Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
As part of its fiscal year 2026 budget legislation, Maryland enacted a number of new tax provisions, including the imposition of a 3% sales tax on a broad range of information technology and data services. The tax took effect...more
INTRODUCTION - The Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill"), as the first law in Hong Kong to deal with cybersecurity was passed on 19 March 2025, and will come into force on 1 January 2026....more
Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more
When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more
On July 23, the White House released its strategic action plan on AI, “Winning the Race: America’s AI Action Plan” (the AI Action Plan), which is designed to secure U.S. global leadership in AI with a strategic focus on...more
This month’s Bid Protest Roundup focuses on three recent protests from the U.S. Government Accountability Office (GAO). The first protest involves an organizational conflict of interest, the second pertains to oral...more
In today’s always-online world, cyber resilience is a business imperative. For midsize and fast-growing small companies, the stakes have never been higher. The convergence of artificial intelligence (AI), increasingly...more
This monthly report outlines key developments in China’s data protection sector for July. The following events merit special attention: CAC Issues Third Edition of the Data Export Security Assessment Application Guide: On...more
In this episode of OK at Work, attorneys Sarah Sawyer and Russell Berger from Offit Kurman discuss the newly implemented sales tax on IT and data services in Maryland. They explore the implications for business owners in the...more
If you own an electric vehicle, keep an eye on cybersecurity issues that may affect your car and its accessories. You wouldn’t think that an electric vehicle charger could include a vulnerability that allows threat actors to...more
For those who grew up gripping a joystick and dodging alien fire in Defender, riding ostriches through floating platforms in Joust, or crossing a hectic freeway in Frogger, winning wasn’t about memorizing rules; it was about...more
Last month, Hallyu Korean BBQ (“Defendant”) was named as a defendant in an internet accessibility lawsuit in the United States District Court for the Southern District of Florida. Plaintiff, who is blind, alleged that...more
On July 8th, 2025, President Trump issued an order (the “Order”) forcing divestment of U.S.-based Jupiter Systems (“Jupiter”) by its China-based parent company, Suirui Group Co., Ltd. (“Suirui”), more than five years after...more
In January, Relativity announced that Relativity Server will no longer accept new matters beginning in 2028. Recently, they reinforced that message with a clear call to action: the future of eDiscovery is in the cloud—and the...more
Coworker.ai has recently announced the launch of the world’s first AI “teammate,” an agent that can perform complex work at the level of an experienced colleague. Powered by Organizational Memory (OM1), a proprietary memory...more
President Donald Trump signed H.R. 1, known as the One Big Beautiful Bill Act (OBBB), into law on July 4, 2025. (For a detailed analysis of the bill, see Holland & Knight's previous alert, "Trump Signs the One Big Beautiful...more
The Digital Operational Resilience Act ("DORA") is the EU's latest legislative effort to enhance digital operational resilience across the financial sector through a harmonised set of rules for managing information and...more
I didn’t plan on working in cybersecurity. My path wasn’t exactly traditional, but every job I had taught me how systems break—technical or operational, it didn’t matter. ...more
Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more
The ability to automate routine work without disrupting your day is no longer a luxury. That’s where “background apps” come in (included as part of our ndMAX AI App Builder)....more
The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more
The surge in adoption of digital technologies and AI is rapidly changing the business, investment and security environments. The global demand for improved and increased digital infrastructure capacity, resilience, speed and...more
The Department of Defense’s (“DoD”) Under Secretary for Acquisition and Sustainment issued a memorandum on June 23, 2025, that tightens oversight on DoD contracts for information technology consulting & management services...more
As part of its 2025 Budget Reconciliation and Financing Act, Maryland is introducing a 3% sales and use tax on a broad range of information technology (IT) services, effective July 1, 2025. This “tech tax” is designed to...more
Earlier this month, President Trump issued an Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), which amends both Biden...more