News & Analysis as of

National Security Today's Popular Updates Data Security

Latham & Watkins LLP

Cybersecurity Regulation in Flux as Trump Administration Focuses on Evolving Foreign and Tech Threats

Latham & Watkins LLP on

The administration has signaled a potential softening of cyber regulation for domestic entities, with increasing focus on national security priorities and preparing for the future....more

McDonnell Boehnen Hulbert & Berghoff LLP

AI News Roundup – Impostor uses AI to imitate U.S. Secretary of State, EU unveils code of practice for AI regulations, AI-powered...

To help you stay on top of the latest news, our AI practice group has compiled a roundup of the developments we are following....more

Woods Rogers

New Cybersecurity Executive Order Revises Specific Federal Policies While Retaining Core Security Principles

Woods Rogers on

On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more

Morrison & Foerster LLP

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones

Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Eversheds Sutherland (US) LLP

Navigating new compliance requirements for DOJ’s Bulk Data Rule

While the US federal government is largely scaling back its rulemaking and compliance efforts, one critical exception is where personal data and technology intersect with national security. Exemplifying this trend, on April...more

Lathrop GPM

New DOJ Limits on Cross-Border Data Transfers Prompt Assessment by Businesses

Lathrop GPM on

On April 8, the National Security Division of the U.S. Department of Justice’s (DOJ) new rule on cross-border data transfers takes effect. It restricts U.S. businesses from transferring certain bulk sensitive personal data to...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Dacheng

DeepSeek and China’s AI Regulatory Landscape: Rules, Practice and Future Prospects

Dacheng on

During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Robinson+Cole Data Privacy + Security Insider

Three States Ban DeepSeek Use on State Devices and Networks

New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Morrison & Foerster LLP

BIS Issues Interim Final Rule on Artificial Intelligence Diffusion as Biden Exits

On January 13, 2025, the Department of Commerce’s Bureau of Industry and Security (BIS) published an Interim Final Rule (IFR) that expands controls on advanced computing integrated circuits (ICs or chips) and model weights...more

Goodwin

Access Restricted: DOJ Prohibits or Restricts Data Sharing with China, Russia, and Other Specified Countries

Goodwin on

On December 27, 2024, the US Department of Justice (DOJ) issued a final rule establishing a new national security program to prevent access to Americans’ bulk sensitive personal data and government-related data by China...more

Foley Hoag LLP - Security, Privacy and the...

U.S. House Report Addresses AI Concerns, Including Privacy and Data Security

Overall, the Report recognized the complex interplay between AI advancement and privacy/security concerns, advocating for a balanced approach that promotes innovation while protecting individual rights and national interests....more

Health Care Compliance Association (HCCA)

Privacy Briefs: November 2024

Change Healthcare Inc. has amended its initial breach report to the HHS Office for Civil Rights (OCR) to state that 100 million individuals were impacted by its mammoth ransomware attack and breach. However, as of Oct. 24,...more

Skadden, Arps, Slate, Meagher & Flom LLP

Navigating the New Cybersecurity Landscape: Key Implications of the EU’s NIS 2 Directive

The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more

Eversheds Sutherland (US) LLP

Treasury releases proposed Outbound Investment Security Program rules

On June 21, 2024, the US Department of the Treasury (Treasury) released proposed new federal regulations (Proposed Rules) that, if implemented, would prohibit or require notification of a broad range of outbound investment...more

Morgan Lewis

AI, Privacy, and Foreign Investment: Top Congressional Investigation Trends for Technology Companies

Morgan Lewis on

The technology industry is squarely under Congress’s spotlight these days. Rapid advances in artificial intelligence (AI), electric vehicles, and green energy, as well as concerns over data security and privacy, foreign...more

Polsinelli

Critical Infrastructure Cybersecurity – Evolving Incident Response Obligations, Integral to Effective Risk Management

Polsinelli on

Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more

King & Spalding

Executive Order Restricts Foreign Access to U.S. Data, Citing National Security Risks

King & Spalding on

On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Morrison & Foerster LLP

M&A in 2023 and Trends for 2024

M&A activity in 2023 was subdued, as dealmakers grappled with geopolitical tensions, inflation, rising interest rates, and increasing regulatory scrutiny, against a backdrop of general economic uncertainty. Challenges in the...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

65 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide