News & Analysis as of

National Security Today's Popular Updates Risk Assessment

Morrison & Foerster LLP

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones

Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

StoneTurn

2025 and Cybersecurity: What is Your Strategy?

StoneTurn on

Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

K2 Integrity

First Ever Targeted Guidance On Financial Institutions’ Compliance With Export Administration Regulations

K2 Integrity on

On 9 October 2024, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) published its first ever unilateral guidance specifically addressed to financial institutions (FIs). The Guidance to Financial...more

King & Spalding

Executive Order Restricts Foreign Access to U.S. Data, Citing National Security Risks

King & Spalding on

On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more

Lowenstein Sandler LLP

The BIOSECURE Act: Proposed New Legislation Could Affect U.S. Companies’ Plans to Contract With Chinese Biotechnology Companies

Lowenstein Sandler LLP on

The U.S. Senate and the U.S. House of Representatives are both considering legislation that could have a serious impact on the ability of U.S. biotechnology, drug, and medical device companies to do business with...more

HaystackID

The Critical Role of CFIUS in Safeguarding U.S. National Security: Insights and Implications for Technology and Legal...

HaystackID on

Editor’s Note: The Committee on Foreign Investment in the United States (CFIUS) plays a pivotal role in regulating foreign investments in American companies, particularly those that could impact national security. This...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Regulating AI: An Overview of Federal Efforts

This first part of a two-part series on U.S. regulation of artificial intelligence systems provides an overview and modern context for the existing regulatory, legal and risk management landscape for AI systems in the U.S.,...more

Morrison & Foerster LLP

Several UK Government National Security Interventions Confirm Heightened Deal Risk for UK Investments

Last week saw the first publicly disclosed uses by the UK Government of its new and expansive powers to investigate deals on national security grounds under the National Security and Investment Act (“NSIA”), which came into...more

Greenbaum, Rowe, Smith & Davis LLP

President Biden Calls on Private Sector Businesses to Implement Heightened Cybersecurity Risk Protocols

What You Need to Know- •President Biden has called upon private sector businesses to take specific steps to implement certain “best practices” aimed at minimizing their cybersecurity risks in light of heightened concerns...more

Wiley Rein LLP

TSA Rail Cybersecurity Directives Show Increasing Government Regulation of Critical Infrastructure and the Private Sector

Wiley Rein LLP on

What: The Transportation Security Administration (TSA) has issued two Security Directives aimed at passenger and freight railroad cybersecurity, continuing the government’s move to an increasingly regulatory approach to...more

Vinson & Elkins LLP

DHS Pipes Up: Issues Directive On Enhancing Pipeline Cybersecurity

Vinson & Elkins LLP on

On May 27, 2021, against the backdrop of the Colonial Pipeline cybersecurity incident, the Department of Homeland Security’s Transportation Security Administration (“TSA”) announced Security Directive Pipeline-2021-01...more

Skadden, Arps, Slate, Meagher & Flom LLP

UK Government Issues Report on Huawei Vulnerabilities

On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more

Akin Gump Strauss Hauer & Feld LLP

Six Recent Government Supply Chain Risk and Cybersecurity Initiatives

• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more

Snell & Wilmer

Cybersecurity on Your Project: Why Not Follow National Security Strategy?

Snell & Wilmer on

In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more

Thomas Fox - Compliance Evangelist

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide