News & Analysis as of

Software Risk Mitigation

Hahn Loeser & Parks LLP

Expanding Intrigue of AI in Construction

Artificial Intelligence (“AI”) has roared into the discourse of the new economy. While the construction industry has lagged behind in its implementation, there is no doubt that AI has become an inescapable reality....more

Fenwick & West LLP

The CrowdStrike Ripple Effect: Ongoing Reporting Implications for Public Companies

Fenwick & West LLP on

Companies impacted by CrowdStrike’s defective software update should consider the following long-term reporting implications...more

DLA Piper

Gone in a Flash: Unravelling the Mystery of Ephemeral Messaging

DLA Piper on

Imagine a modern-day meeting room in a bustling corporate office, where executives and employees alike converse in hushed tones, no notes or minutes are taken, and their words disappear almost as quickly as they are spoken....more

Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

King & Spalding

NIST Releases Series of AI Guidelines & Software in Ongoing Response to AI Executive Order

King & Spalding on

The U.S. Department of Commerce’s National Institute of Standards and Technology (“NIST”) recently announced the publication of three AI guidelines as well as its release of a software package aimed at helping organizations...more

WilmerHale

NIST Issues New AI Risk Mitigation Guidelines and Software

WilmerHale on

On July 26, 2024, the National Institute for Standards and Technology (“NIST”), part of the Department of Commerce, released guidelines, a global engagement plan, and software covering various aspects of AI technology...more

K&L Gates LLP

Digital Operational Resilience in the Financial Services Sector: EU and UK Update

K&L Gates LLP on

With under six months to go until the European Union Digital Operational Resilience Act (DORA) becomes applicable on 17 January 2025, DORA implementation projects are running full steam ahead. DORA lays down uniform...more

American Conference Institute (ACI)

CMMC 2.0 and FOCI Assessments: Preparing for What Lies Ahead

Defense contractors and subcontractors that handle Controlled Unclassified Information (CUI) and do not have robust information-security system controls in place better get their house in order now if they want to do business...more

EDRM - Electronic Discovery Reference Model

Worrying About Sycophantism: Why I Again Tweaked the Custom GPT ‘Panel of AI Experts for Lawyers’ to Add More Barriers Against...

I continue to be troubled about AI Sycophantism. What is that? The tendency of generative AI to agree with the user, to respond in a way that is aligned with the user’s biases, errors and hallucinations. In other words, the...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

Robins Kaplan LLP

Navigating the Legal Landscape: Generative AI and Copyright Law

Robins Kaplan LLP on

Generative artificial intelligence captivated the world in 2023 and is firmly positioned to remain center stage in the coming year. In the United States, the introduction and early-stage use of generative AI have been plagued...more

Mitratech Holdings, Inc

Choosing the Right Software for Background Searches: Key Features to Consider

Background checks are essential in hiring, but many HR leaders skip them to save time. This approach causes headaches, so many employers turn to background search software. But with so many options available, how do you...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Opportune LLP

Supply Chain Optimization and Weather Impacts with Alteryx

Opportune LLP on

In today's interconnected global economy, supply chain optimization plays a critical role in driving business success. However, unpredictable weather events such as hurricanes, tropical storms, and extreme weather conditions...more

Benesch

Old Law, New Tricks: Pen Register and Trap and Trace Claims on the Rise

Benesch on

In the latest example of privacy laws being stretched to fit new digital technologies, plaintiffs have begun to file a flurry of suits alleging that retailers are using “pen register” and “trap and trace” software to...more

Mitratech Holdings, Inc

7 Ways Legal Bill Review Software Can Trim Your Expenses

Maximizing Efficiency and Minimizing Costs: Unleash the Power of Legal Bill Review Software. In 2021, legal teams reported spending only a fraction of the day (just 2.5 hours) on billable work. Flash forward to today, and...more

Mitratech Holdings, Inc

10 Common HRC Mistakes and How to Avoid Them

Mitratech Holdings, Inc on

For Human Resources, compliance is king. Ensuring that your organization follows all applicable laws and regulations is a legal obligation and crucial for maintaining a healthy and productive work environment. However,...more

Ankura

Navigating Privacy Compliance Challenges for Startup Success

Ankura on

Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more

Mitratech Holdings, Inc

Choosing the Right Software for Background Checks: Key Features to Consider

This blog post will explore the key features when selecting background check software. From improving candidate flow and upgrading your hiring workflow to ensuring global coverage and maintaining trusted speed and...more

Morgan Lewis - Tech & Sourcing

Risk Mitigation via Software Code Due Diligence

Morgan Lewis’s technology, outsourcing, and commercial transactions team often advises on transactions where there is some form of intellectual property being transferred from one party to another party. This may be due to a...more

Nextpoint, Inc.

Modern eDiscovery Solutions: The Case for the Cloud in 2023

Nextpoint, Inc. on

While the cloud has become commonplace in our everyday lives, many legal teams are still missing out on the benefits of cloud-based ediscovery software. As of 2021, there is a 50/50 split between ediscovery solutions...more

BakerHostetler

Could Careless Coders Face False Claims Liability?

BakerHostetler on

New Software Development Security Attestation and Related False Claims Act Liability for Commercial and Noncommercial Software Developers and Suppliers - Key takeaway - Software producers at all levels in the federal...more

Planet Depos, LLC

Protecting your Law Firm against Ransomware Attacks

Planet Depos, LLC on

Have you heard of ransomware? It is a term often in the news. Ransomware is a type of malware. For those who have heard of it but don’t know what exactly it is, malware is a type of software that is designed to disrupt,...more

Mayer Brown

Software and Data Audits: Tips to Avoid the Traps

Mayer Brown on

Licensees face financial risk and operational disruption in audits by their software and data vendors. Changes in technology are driving a current surge in those audits. Join Mayer Brown partners Richard Assmus, Brad Peterson...more

72 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide