News
New Guidance from NIST Demonstrates How Organizations Can Use AI for Cybersecurity
18+ hour, 15+ min ago (193+ words) The Cyber AI Profile is not intended as a replacement for existing frameworks, such as the NIST CSF 2.0, but rather a supplement to existing frameworks while addressing the unique risks and opportunities presented by AI. It is designed for organizations…...
Updates to NIST Cybersecurity Guidance Show Continued Focus on Cloud Services
1+ day, 2+ hour ago (208+ words) NIST Seeks Comments on Protecting Tokens in Federal Cloud Environments NIST has now released the initial public draft of its publication fulfilling that directive: NIST IR 8587, Protecting Tokens and Assertions from Forgery, Theft, and Misuse: Implementation Recommendations for Agencies and…...
Analyzing the New AI Companion Chatbot Laws
1+ day, 5+ hour ago (243+ words) Key point: Businesses operating companion chatbots in California or New York are subject to new legal obligations, including providing notices to users and ensuring protocols are in place to prevent self-harm. The below article provides an overview of the California…...
How AI is Changing the Incident Response Landscape: What GCs Need to Know
2+ day, 8+ hour ago (379+ words) Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them. This shift is driven by several factors: Cybercriminals took this to…...
Texas Court Blocks Smart TV Data Collection
3+ day, 20+ hour ago (234+ words) A Texas state court has issued a temporary restraining order (TRO) blocking Hisense, a major Chinese smart TV manufacturer, from collecting data on the content viewers watch via Automatic Content Recognition (ACR) technology. What Is ACR And Why Does It…...
SFC v. Vizio ruling on General Public License compliance: Key takeaways
4+ day, 3+ hour ago (341+ words) A California Superior Court appears to have recently answered a longstanding question in the open-source software community and in providing that answer, gave television manufacturer Vizio clarity. This alert provides key takeaways from the ruling for users of open-source software....
FCC Restricts Authorization of Foreign-Made Drones and Critical Components
4+ day, 9+ hour ago (223+ words) What's the Background Here? Separately, the 2025 NDAA required the FCC to add the communications and video surveillance equipment produced by certain Chinese companies named in the 2025 NDAA to the Covered List on December 23, 2025, absent a contrary determination by a national…...
Foreign-Produced UAS and Critical Components Added to FCC’s Covered List
4+ day, 20+ hour ago (421+ words) To address these threats, the White House convened an "executive branch interagency body," which released the Determination with the following key elements: The addition of foreign-produced UAS and UAS critical components to the Covered List is unprecedented, because it is…...
Understanding the Cybersecurity Risks Flooding the Water and Wastewater Systems Sector
5+ day, 4+ hour ago (192+ words) Cyber Threats to the WWS Despite the unique threats facing the WWS, the development of comprehensive federal cybersecurity regulation for the sector remains elusive. This is due in part to limitations in the enabling statutory authority of the EPA, the…...
Here Are the Five Top Security Threats from 2025
1+ week, 17+ hour ago (159+ words) Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks. According to Dark Reading, the…...