Center’s New Amicus Brief in Epic v. Google: Competition Should Not Come at the Expense of Cybersecurity
In too many competition cases, cybersecurity has become an afterthought - the Center is seeking to halt this trend filing a series of amicus briefs seeking to educate the courts about core security consideration to correct lower-court overreach.
AI Governance in Latin America
Artificial intelligence is no longer a technology of the future, it is already transforming how societies function. But these tools need some level of oversight and this is explored in the latest white paper from the Digi Americas Alliance.
European Commission 2028-2034 Budget Proposal Includes Substantial Increase for Cyber, Digital Programmes
The European Commission presented its initial proposal for the European Union’s 2028-2034 financial framework that, if approved, could authorise nearly EUR 2 trillion in spending over seven years for cyber and other digital efforts.
State, Fed Cyber Leaders Discuss Resilience in Light of Evolving Threat, Budget Landscapes
State and federal cyber leaders convened in Austin to discuss the Texas Cyber Command, utilizing Zero Trust strategies in an era of AI, and improving Federal to State cyber cooperation in an era of constricting resources and increased threats.
How Existing Security Frameworks Can Help Meeting Bulk Data Rule Security Requirements
The DOJ bulk data rule prohibits certain transactions involving the sale or transfer of sensitive data. This post examines the security requirements and explains their interaction with existing cybersecurity and risk management frameworks and regs.
Recap: Threat Intelligence Forum
The U.S. Chamber of Commerce convened the Threat Intelligence Forum bringing together leaders from government and industry for in-depth discussions on the latest strategies and innovations shaping the market.
NIST: Analyzing Collusion Threats in the Semiconductor Supply Chain
Semiconductors power our modern technology and are often considered “the oil of the 21st century.” But producing these chips is not without challenges to the supply chain, including IP theft, counterfeiting, and reverse engineering.
CCPL Report: Ensuring the Longevity of the CVE Program
Because the future of the CVE program faces some uncertainty it’s time to start a dialogue about the future of the program. This report is designed to provide that starting point.
Congress’ Proposed Chip Security Act Threatens to Create New Cyber Vulnerabilities in U.S. Semiconductors
As the U.S. races toward global AI dominance, a new bill aimed at preventing diversion of innovative U.S. semiconductors to China could inadvertently make those very same chips less secure.