No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more
NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more
Citing the threats posed by foreign adversaries and criminal organizations, and seeking enhanced accountability for companies that provide software and cloud services to the federal government, the Biden administration has...more
In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more
Data centers power the cloud computing services companies rely on for everyday tasks, including banking, logistics and data storage and processing. In many countries, including Australia and the United States, data center...more
Note to research compliance officials still digesting news of Pennsylvania State’s recent $1.25 million settlement over False Claims Act (FCA) allegations related to cybersecurity and the government’s recent intervention in a...more
With the rapid commercialization of artificial intelligence (AI) technology, the Biden administration has been grappling with its implications, including its potential impact on national security. Several departments have...more
The US Department of Defense (DOD) finalized a rule that takes the next steps toward fully implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 program. This rule formalizes compliance requirements that will...more
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
The EU is in the course of passing a range of new cyber security legislation which will apply to US businesses who provide services in the EU. One part of that legislative programme is the new Network and Information Security...more
On August 30, the Federal Trade Commission (FTC) entered into a proposed settlement order with cloud-based physical security solutions provider, Verkada Inc. (“Verkada”), settling allegations of data security violations and...more
The deadline is fast approaching for in-scope financial entities and their ICT service providers to conform to the EU’s new digital operational resilience regulation. With effect from 17 January 2025, a broad range of EU...more
Offering your software product under an open-source software (OSS) license has its advantages. By making the source code of your product available for redistribution and modification, and in many instances at no cost, you may...more
The contracting industry has seen a digital transformation, generating excitement for how contracts are created, managed, and executed. Technology adoption has introduced efficiencies, improved accuracy, and enabled better...more
“Software-as-a-Service,” commonly known as “SaaS,” is a subscription-based software distribution model in which the vendor allows users to connect to and use cloud-based applications over the Internet for the subscribed term....more
In our recent article, we discussed FedRAMP’s Roadmap to the Future, outlining FedRAMP’s ambitious plan to breathe new life into the FedRAMP program by, among other goals, updating the authorization process and automating key...more
In our previous blog, we discussed the rising operational costs associated with maintaining on-premises document management systems (DMS) in law firms. This installment will focus on another critical aspect that is compelling...more
This Essential Guide to the European Data Act is part of Orrick's Cybersecurity & Privacy Compass Series. The Cybersecurity & Privacy Compass is your global guide to the evolving cybersecurity and privacy regulatory...more
Although there was a big post-pandemic push to move to the cloud, some law firms still find themselves at a crossroads between maintaining their traditional on-premises document management system (DMS) and transitioning to...more
For more information about France’s SREN law, see our update that provides five key takeaways for businesses. Two new laws impose an array of obligations and restrictions on cloud providers in France. First, the European...more
The European Union Cloud Services Scheme (“EUCS”) is a certification framework for cloud services introduced under the EU Cybersecurity Act. Currently still under consultation, the EUCS, once finalised, will be implemented by...more
There were no signs of slowing down as FedRAMP announced its ambitious plan to make significant changes over the next two years. During a recent public forum, FedRAMP discussed the planned changes to its program to...more
Modern investigations require modern data collection solutions to solve the complex challenges facing eDiscovery practitioners. With employees generating vast amounts of data stored across multiple platforms and applications,...more
In early March 2024, the Nevada Gaming Control Board (“Board”) voted unanimously in favor of a series of proposed amendments to Gaming Regulation 5, specifically as it pertains to registered hosting centers and service...more