On February 16, 2016, Secretary of Homeland Security Jeh Johnson announced interim guidelines and procedures for sharing cyber threat indicators under the Cybersecurity Information Sharing Act of 2015 (“CISA”). Because the guidelines are voluntary, the next question is, should your company share information with the Government?
Continue Reading To Share or Not to Share (with the Government)? That is the Question: DHS Announces Interim Guidelines for Sharing Cyber Threat Indicators

Christine Couvillon
It’s (Not) Academic: Cybersecurity Is a Must for Universities and Academic Medical Centers
Cutting-edge research institutions need cutting-edge cybersecurity to protect their IP and critical personal and financial data. Universities hold vast repositories of valuable information, including student healthcare information, patient information from academic medical centers, and financial and personal data from applicants, donors, students, faculty, and staff. So it’s no surprise hackers have been targeting universities lately—in fact, at least eight American universities have announced cyber intrusions over the past two years.
Continue Reading It’s (Not) Academic: Cybersecurity Is a Must for Universities and Academic Medical Centers
Department of Defense Updates Its Instruction for Acquisitions of Software and Weapons Systems
On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist acquisition personnel in tailoring the acquisition process to the specific item or system being purchased and to further the Department’s Better Buying Power initiative, launched in 2010. The Instruction focuses largely on the acquisition of DoD-specific software and weapons systems.
Continue Reading Department of Defense Updates Its Instruction for Acquisitions of Software and Weapons Systems