News & Analysis as of

Information Technology Risk Management

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

HaystackID

Engineering Cyber Resilience: Lessons from the Tallinn Mechanism

HaystackID on

When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more

Paul Hastings LLP

White House Releases AI Action Plan: "Winning the Race: America's AI Action Plan"

Paul Hastings LLP on

July 23, the White House released its strategic action plan on AI, “Winning the Race: America’s AI Action Plan” (the AI Action Plan), which is designed to secure U.S. global leadership in AI with a strategic focus on...more

K2 Integrity

Navigating the Cybersecurity Minefield: Why Midsize Companies Need On-Demand Expertise in the Age of AI and Ransomware

K2 Integrity on

In today’s always-online world, cyber resilience is a business imperative. For midsize and fast-growing small companies, the stakes have never been higher. The convergence of artificial intelligence (AI), increasingly...more

McCarter & English Blog: Government Contracts...

FAR 2.0 Part 39 in Arcade Mode—How Federal IT Acquisition Just Hit Reset

For those who grew up gripping a joystick and dodging alien fire in Defender, riding ostriches through floating platforms in Joust, or crossing a hectic freeway in Frogger, winning wasn’t about memorizing rules; it was about...more

Accelerynt, Inc.

How I Learned to Prioritize in Cybersecurity—and Why It Changed Everything

Accelerynt, Inc. on

I didn’t plan on working in cybersecurity. My path wasn’t exactly traditional, but every job I had taught me how systems break—technical or operational, it didn’t matter. ...more

Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Fox Rothschild LLP

Update: FAR 2.0 Parts 18, 39, and 43 Released

Fox Rothschild LLP on

The Trump Administration, through the Office of Federal Procurement Policy, has revealed the next set of revised Federal Acquisition Regulation (FAR) sections as part of the Revolutionary FAR Overhaul (RFO): FAR Parts 18, 39,...more

Schwabe, Williamson & Wyatt PC

FAR Council Releases Modifications to Three Sections

The FAR Council is undertaking a systematic approach to revising the FARs. On Friday, June 13, 2025, it released its revisions to FAR Part 18 – Emergency Acquisitions, FAR Part 39 – Acquisition of Information and...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Alston & Bird

European Vulnerability Database Published by the European Union Agency for Cybersecurity

Alston & Bird on

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more

Association of Certified E-Discovery...

[Webinar] Beyond Cleanup: Turning Defensible Data into AI-Ready Insights - June 12th, 10:00 am PDT

You’ve cleaned up your data—now what? In the second part of this two-part webinar based on an actual case study, we’ll explore the next frontier: turning that defensible, well-managed data into a launchpad for AI-driven...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

EDRM - Electronic Discovery Reference Model

[Webinar] Down the Rabbit Hole: Navigating IP Theft Investigations - May 29th, 1:00 pm - 2:15 pm ET

Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

McDermott Will & Emery

Risk Management in the Modern Era of Workplace Generative AI

Generative artificial intelligence (GenAI) is becoming more prevalent in the workplace, including as a tool for human resources (HR) leaders to use in their employment practices. At the same time, close to a dozen states have...more

Troutman Pepper Locke

The Least Known Risk in the Energy Sector: The “ICTS” National Security Rules

Troutman Pepper Locke on

There are unprecedented risks and opportunities emerging for companies in the energy sector as the Trump administration’s priorities start to come into focus. Many of those are well-known to the industry. Here’s one that’s...more

Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

Morgan Lewis - Tech & Sourcing

Global Capability Centers: The Next Gen of Delivery Models

2025 has seen a notable push by companies to establish dedicated capability centers—or global capability centers (GCCs)—in countries with lower-cost resources and access to a strong talent pool. According to S&S Insider, the...more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Mitigation Strategies

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more

Troutman Pepper Locke

Inside New Commerce Tech Restrictions: Key Risk Takeaways

Troutman Pepper Locke on

The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more

Davis Wright Tremaine LLP

FedRAMP 20x Initiative Promises Major Changes for Federal Cloud Service Providers

Major changes are coming again to the Federal Risk and Authorization Management Program ("FedRAMP"), the federal government's cybersecurity authorization program for cloud service providers ("CSPs")....more

A&O Shearman

EC publishes draft delegated regulation on subcontracting RTS under DORA

A&O Shearman on

On March 24 2025, the European Commission (EC) adopted the final draft Delegated Regulation setting out Regulatory Technical Standards (RTS) for subcontracting ICT services supporting critical or important functions under the...more

531 Results
 / 
View per page
Page: of 22

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide