Data Privacy & Cybersecurity
Systems once seen as isolated and harmless are now networked. Where there’s connectivity, there’s risk—especially with legacy building systems.
Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.
Read about Bridgestone’s cyberattack response and the legal and regulatory implications for manufacturers of increasing ransomware risks.
Read about supply chain attacks affecting Cloudflare, Proofpoint, and others, exposing Salesforce data and prompting urgent security responses.
Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.
Learn how a loophole in new rules allows stablecoins to generate rewards, sparking a fight between banks, regulators, and crypto exchanges.
Discover how IBM and AMD’s quantum computing collaboration could transform industries, speed problem-solving, and unlock a multibillion-dollar market.
Learn about the Department of Defense’s connection with Russia through a widely used Node.js utility that raises open-source security and oversight questions.
Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.
Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.