The Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) jointly published a new resource as part of their ongoing efforts to promote awareness of, and help organizations defend against, supply chain risks. The publication, Defending Against Software Supply Chain Attacks, provides recommendations for software customers and vendors as well as key steps for prevention, mitigation and resilience of software supply chain attacks.
Software supply chain attacks occur when a cyber threat actor infiltrates a software ...
A recently discovered security vulnerability potentially affecting at least 100 million Internet of Things (“IoT”) devices[1] highlights the importance of the newly enacted IoT Cybersecurity Improvement Act of 2020 (the “IoT Act”). Researchers at the security firms Forescout Research Labs and JSOF Research Labs have jointly published a report detailing a security vulnerability known as “NAME:WRECK.” This is exactly the type of issue that the new IoT Act was and is designed to address at the governmental level, because the vulnerability can detrimentally affect ...
Blog Editors
Recent Updates
- Video: “Stay or Pay” Agreements, Developing Immigration News, EEOC Power Shift - Employment Law This Week
- New York’s Trapped at Work Act, in Effect for Now, but New Bill Aims to Amend Terms and Extend Effective Date
- Video: How Jonathan Brenner Delivers Creative Legal Solutions for California Employers
- Video: FMLA and FLSA Compliance in 2026—New DOL Opinion Letters and Emerging Risks - Employment Law This Week
- Federal Shutdowns and Workplace Law: Navigating Legal Uncertainty