Protecting the Crown Jewels: A Practical Playbook for Business Leaders

Protecting mission‑critical information requires disciplined asset classification, clear ownership and governance, targeted controls, and a security culture that makes protection part of business as usual. By Steve Durbin, Chief Executive, Information …

Key Cybersecurity, Privacy, and National Security Considerations for Data Centers in 2025

By Erin E. Martin, Catherine North Hounfodji and David Plotinsky, of Morgan Lewis Unlike Europe’s comprehensive General Data Protection Regulation framework, the United States still lacks an all-encompassing data privacy statute. Instead, data centers …

Developing Real-Time Communication Applications with WebTransport, WebSocket, WebRTC and GPT4o Realtime

By Dr. Magesh Kasthuri, Distinguished Member of Technical Staff & Chief Architect, Wipro Limited; Dharanidharan Murugesan, Technical Lead, Wipro Limited; Saravanan Munusamy, Microsoft Azure App modernization specialist, Wipro Limited Introduction D…

The rise of ‘agentic’ AI: Potential new legal and organizational risks

By Danny Tobey, Karley Buckley, Karley Buckley, and Kyle Kloeppel, of DLA Piper Artificial intelligence (AI) technology is advancing rapidly. A key development is the emergence of “agentic” AI structures, which operate with a greater autonomy compared …

Mastering Internal Influence, a Former CIO’s Perspective

By Brad Englert You can master influence inside your organization by creating and nurturing authentic business relationships with your boss, direct reports, all your staff, peers and influencers, and executive leaders. Business relationships are authen…