2/23/2026 8:50:06 AM Tech 10 – Episode 10: Realising value in disruption: Technology, AI and Cyber in 2026 By Clive De Silva Beth Musumeci Catherine Brien Oli Freestone +1 more... Show less The Tech 10 video series explores the key questions driving technological change and innovation today. Here, we bring the future of...
2/19/2026 10:00:48 AM Spain's financial regulator publishes FAQs on DORA implementation: what you need to know By Ceyhun Pehlivan The Digital Operational Resilience Act (DORA) has applied across the EU since 17 January 2025. It sets a comprehensive framework for...
2/17/2026 3:02:07 PM Agentic AI: ICO signals opportunity but with renewed expectations on governance and clarity By Quintin Farley Beverley Flynn Emma Thompson The ICO’s new “tech futures: Agentic AI report” marks an important moment in the regulatory conversation around advanced AI systems. The...
2/13/2026 12:46:07 PM Data Use & Access Act - new complaints procedures - are you preparing ? By Beverley Flynn ICO issues updated data protection complaints guidance in advance of DUAA June in force date. The ICO has published the final data...
2/12/2026 3:03:07 PM Considering a Dutch Ministry of Defense tender? Make sure to prepare for ABDO 2019 compliance By Alexander Bannink Jochem de Kok Jasper Wesselman Zeeger de Jongh Jochem Spaans Marinus Winters Pieter Huizing +4 more... Show less If you plan to bid for a Dutch Ministry of Defense (MoD) contract, the General Security Requirements for Defense Contracts (Algemene...
2/12/2026 12:31:37 AM ASIC cyber enforcement outcome against FIIG — what the February 2026 penalty means in practice By Jonathon Ellis In February 2026, the Federal Court ordered FIIG Securities Limited (FIIG) to pay $2.5 million in civil penalties (plus $500,000 in...
2/10/2026 6:29:27 PM Threat-Led Cyber Security Testing: Insights from the Bank of England By Alex Reid The Bank of England’s 2025 CBEST thematic report, alongside the Prudential Regulation Authority and the Financial Conduct Authority,...
2/9/2026 1:31:06 PM Caught between Brussels and Washington By Beth George Lutz Riede We were delighted to host AILBA in our Freshfields San Francisco office, bringing together an exceptional panel of speakers — including...
2/9/2026 3:31:37 AM Key Revisions and Compliance Recommendations of the PRC Cybersecurity Law By James Gong Yiting Wang China’s Cybersecurity Law (“CSL”) has been comprehensively revised and officially took effect on 1 January 2026. This article focuses on...
2/6/2026 9:59:07 AM The Data (Use and Access) Act 2025: key reforms in force By Beverley Flynn Guy Cartwright Emma Thompson The Data (Use and Access) Act 2025 (DUAA) represents the UK’s most significant package of data protection and digital information reforms...
2/4/2026 5:12:07 PM The EU Digital Omnibus - streamlining the data, cyber, and AI regulatory framework By Beverley Flynn Guy Cartwright The European Commission has published its proposal for the simplification of the EU’s digital rulebook, see: Digital Omnibus Regulation...
2/4/2026 9:49:40 AM UK Cyber Security and Resilience Bill under scrutiny By Emma Thompson Beverley Flynn On the 3 February 2026, the Public Bill Committee met for the first time to scrutinise the Cyber Security and Resilience (Network and...
2/2/2026 8:48:09 PM In Case You Missed It: Data Privacy Week 2026 By Steve Millendorf Gabe Wild Alex Misakian Samuel Goldstick Jennifer Urban Aaron Tantleff Erica Bade +4 more... Show less Last week, our Cybersecurity & Data Privacy team delivered a packed lineup of insights, expert discussions, and practical guidance to...
1/30/2026 7:04:08 PM Privacy Podcast Episode Four: The Blur Between Privacy and Security By Aaron Tantleff Jennifer Urban Key Takeaways The traditional separation between privacy and security is dissolving as technology and regulations force roles and...
1/30/2026 12:10:25 PM The 2026 OWASP Top 10 for Agentic AI Applications By Craig Millgate The OWASP GenAI Security Project has recently released the OWASP Top 10 for Agentic Applications for 2026, a globally peer-reviewed...
1/29/2026 7:01:14 PM Your Next Data Breach May Start With a Job Interview: The Deepfake Candidate Problem By Andrew R. Lee Jeffery L. Sanches The scenario sounds like science fiction: a candidate aces a video interview, clears a background check, and starts work only to deploy...