News & Analysis as of

Supply Chain Today's Popular Updates Cybersecurity

Maynard Nexsen

Big Beautiful Bill Includes Funding for Offensive Cyber Operations – Insights and Implications

Maynard Nexsen on

The One Big Beautiful Bill Act (“OBBBA”) (Publ. Law 119-21), enacted in July 2025, is a sweeping piece of legislation that addresses many issues. Among them, it allocates $1 billion over four years to boost U.S. offensive...more

Goodwin

America’s AI Action Plan Emphasizes Governance and Risk Management to Promote the Secure and Safe Adoption of AI Tools

Goodwin on

On July 23, 2025, the Trump Administration released its AI Action Plan (“the Plan”), a long-anticipated roadmap for the federal government’s approach to AI governance that presents a number of implications for businesses...more

Baker Botts L.L.P.

White House Unveils "America's AI Action Plan"

Baker Botts L.L.P. on

On July 23, 2025, the White House published its much-anticipated “America’s AI Action Plan” (the Plan), a comprehensive strategy designed to advance U.S. global leadership in artificial intelligence (AI). Developed under the...more

Goodwin

The Devil’s in the Details: Executive Order on Cybersecurity Reveals Administration’s Focus on AI-Cyber Convergence, Secure...

Goodwin on

On June 6, 2025, President Trump issued an Executive Order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (the “Order”). The measure...more

Woods Rogers

New Cybersecurity Executive Order Revises Specific Federal Policies While Retaining Core Security Principles

Woods Rogers on

On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

A&O Shearman

Trump White House issues executive order on cybersecurity

A&O Shearman on

While the Order preserves significant portions of President Biden’s most recent cyber executive order—including provisions aimed at securing the software supply chain, federal government systems, and federal...more

Wiley Rein LLP

President Trump’s Cyber Mandate: Analysis of Executive Order on Strengthening U.S. Cybersecurity

Wiley Rein LLP on

President Trump issued a cybersecurity Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity” (Trump EO), along with a corresponding Fact Sheet on June 6, 2025. The Trump EO clears some of the...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Ropes & Gray LLP

Glow Up or Sell Out? Opportunities and Risks in the Consumer Health and Beauty Sector

Ropes & Gray LLP on

The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Hogan Lovells

The Cyber Security and Resilience Bill

Hogan Lovells on

On 1 April 2025, the UK Department for Science, Innovation and Technology issued a policy statement setting out its key proposals for the new Cyber Security and Resilience Bill. The Bill is intended to respond to an...more

Pillsbury Winthrop Shaw Pittman LLP

The EU’s Cyber Resilience Act: New Cybersecurity Requirements for Connected Products and Software

The CRA will affect a broad range of digital products placed on the EU market (including by those based outside the EU), including connected hardware/devices, software and remote data processing solutions. The EU has adopted...more

Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

J.S. Held

2025 J.S. Held Global Risk Report: Global Supply Chain Challenges

J.S. Held on

The importance of the global supply chain has never been more apparent since the COVID-19 pandemic resulted in worldwide shortages of products and drove prices and inflation skyward. Supply chain disruptions have become the...more

BakerHostetler

The Next Secretary of Defense and National Security Priorities: What Companies Need to Know

BakerHostetler on

Pete Hegseth, during his Secretary of Defense (SECDEF) confirmation hearings, articulated several priorities that could have a significant impact on private industry in the United States. These priorities focused primarily on...more

Ankura

NIS2: What It Means for Businesses in APAC

Ankura on

NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more

Eversheds Sutherland (US) LLP

Global Supply Chain Horizons - December 2024

Welcome to the latest edition of our quarterly global supply chain horizons providing you with an update on the key developments from around the world - Asia - China: Export ban of critical minerals to the US - On December...more

Ankura

7 Strategies to Overcome Supply Chain Disruptions: Mitigate Risk While Enhancing Resilience and Adaptability

Ankura on

Supply chain disruption and persistent inflation remain critical issues in the global economy, with ongoing geopolitical tensions, the evolution of digital threats, and increasing emphasis on sustainability reshaping the...more

Husch Blackwell LLP

Commerce Department Bans Kaspersky Software in First ICTS Prohibition, Signals Increased Risk of Using Certain Foreign Software...

Husch Blackwell LLP on

On June 20, 2024, the U.S. Department of Commerce’s Bureau of Industry and Security (“BIS”) issued a Final Determination prohibiting the sale of certain cybersecurity products, anti-virus software, and related services to...more

Foley & Lardner LLP

What Goes Around Comes Around: The Resurgence of Data Breach Class Actions

Foley & Lardner LLP on

Data breach class actions are again on the rise, with a recent report by Lex Machina confirming what many cybersecurity practitioners have seen first-hand over the last two years. The findings also reaffirm longstanding best...more

NAVEX

Supply-Chain Risk Is Eating the World

NAVEX on

Ethics and compliance officers have long had an uneasy relationship with corporate sustainability efforts, mostly because most compliance officers aren’t quite sure they want – or know how to handle – responsibility for it. ...more

Butler Snow LLP

A New Look at an Old Hot Topic: The Internet of Things

Butler Snow LLP on

In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more

188 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide