Latest Publications

Share:

AT&T Data Breach: Lessons For Cloud-Base Technology Solutions

Last Friday, July 12, 2024, it was widely reported that AT&T experienced another catastrophic cyber-attack. This material cyber incident affected over 100 million of its wireless customers according to AT&T’s 8-K Filing with...more

CMMC 2.0: Level One: A Self-Assessment

As we promised a trilogy in our earlier 2024 CMMC Blog – “Get Ahead of Compliance: The Proposed Rule for the Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!” – we continue our series with a discussion of each...more

The FTC’s Expanded Cybersecurity Requirements Affecting Non-Banking Small Businesses

The expansion of the FTC’s Safeguards Rule will require businesses to notify customers and the FTC of cyber breaches that had previously been excluded from reporting requirements. Previously, only banks had been required to...more

Get Ahead Of Compliance: The Proposed Rule For The Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!

As a lawyer working in a firm with a sophisticated legal team providing robust regulatory, government contract, and cybersecurity services, our Christmas present and holiday reading arrived early with the publication of the...more

The “New” Narrative Requirement In SBA 8(a): Business Development Program Eligibility For Socially And Economically Disadvantaged...

The US Small Business Administration (“SBA”) has a long history of supporting socially and economically disadvantaged business owners under Title 15, Chapter 14A, Sections 636(j)(10) and 637(a) of the United States Code. One...more

Risky Business And Cyber Attacks… Simple Steps To Limit Liability Of Cybersecurity Service Providers

The consequences of a cyber attack can be significant and wide-ranging for both an individual and a business – no matter how big or small. Cyber attacks can result in serious data breaches that lead to the theft or exposure...more

The Rise Of Biometric Data Collection And Privacy Practices In Government Contracts And Beyond

Biometric data refers to an individual’s physical attributes such as fingerprints, facial recognition, or Iris scans for the purpose of identification. This type of data is currently being used by many government agencies for...more

Getting Your Early-Stage “Start-Up” House in Order

For anyone who has ever put a home for sale understands there are a lot of steps that must be taken to make real estate “showcase” ready for prospective buyers. These steps may include de-cluttering, new paint, modern...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide