Latest Posts › Data Security

Share:

Technology Transactions & Data Privacy - 2025 Report

It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more

NIST Releases Risk ‘Profile’ for Generative AI

A year ago, we highlighted the National Institute of Standards and Technology’s ("NIST") release of a framework designed to address AI risks (the “AI RMF”). We noted how it is abstract, like its central subject, and is...more

Critical Infrastructure Cybersecurity – Evolving Incident Response Obligations, Integral to Effective Risk Management

Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more

Generative AI’s ‘Industry Standards’ for Cybersecurity and Data Privacy Could be Here Sooner Rather than Later

AI may be both the most “powerful capability of our time” and the “most powerful weapon of our time." That’s according to Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency, when interviewed...more

Leveraging “Public-Private Collaboration” for Critical Infrastructure Cybersecurity

In March, the White House issued its long-awaited National Cybersecurity Strategy.  The strategy includes five pillars, Pillar One being “Defend Critical Instructure” with its first and second subparts focusing on (1)...more

Guidance for the ‘Burden of Cybersecurity Compliance’ Emerges

Two months ago, the White House released its National Cybersecurity Strategy.  Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors.  For example, the...more

It’s Here – The New National Cybersecurity Strategy

Today, after months of rumors regarding its release and contents, the White House issued its National Cybersecurity Strategy “to secure the full benefits of a safe and secure digital ecosystem.” The full strategy is 39 pages...more

Blockchain Developers Urge Congress – Be Bold About Data Privacy and Security

Crypto is dead or on life support, waiting for regulation to rid it of ‘crypto contagion.’  Meanwhile, blockchain technology – the virtual, public ledger technology that records crypto transactions – is very much alive, as...more

For OT Cybersecurity, Extra Time is Running Out

Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more

FTC Announces Decision “with a 100% chance of far-reaching” Impact for Data Breaches

On Monday the Federal Trade Commission issued a press release stating it is settling a case against Drizly and its CEO for a data breach that exposed the information of 2.5 million consumers in July 2020. The proposed...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide