May 6, 2026

Alabama and Oklahoma Introduce Virginia-Style Privacy Laws

After no state enacted a comprehensive privacy law in 2025, Alabama and Oklahoma moved ahead with Virginia-style statutes in early 2026. Now there are 21 states with such laws, deepening the patchwork of privacy rules as Congress again weighs federal action. This article reviews key provisions of the pair of new state privacy laws, discusses trends in the U.S. privacy law landscape and offers compliance tips, with insights from experts at Covington, Hogan Lovells and Miller Nash. See “State Privacy Law in 2025: Eight Practical Articles for Navigating the Compliance Landscape” (Jul. 2, 2025).

Eyewitness Accounts and Recommended Actions to Counter AI’s Strain on Cyber Defense

Leading incident responders and defenders shared firsthand lessons from recent attacks at the Incident Response Forum 2026, highlighting how adversaries are using AI to accelerate exploits and evolve ransomware while defenders struggle to keep pace. They cautioned that defenders face a difficult year as vulnerabilities surge faster than teams can keep pace, even amid accelerating innovation in security tools such as Anthropic’s new Claude Security platform. This article explores the AI threat landscape and offers practical cyber defense and incident response priorities, drawing on commentary from Cooley, Davis Wright Tremaine, FTI Consulting, Kirkland, Morgan Lewis, MOXFIVE, Orrick and Palo Alto Networks. See “Mitigating Cyber Risks From AI and Ever-Stealthier Adversaries” (Apr. 8, 2026).

Understanding and Mitigating Six Key Cyber Threats

In a follow-up to its 2026 Global Threat Report, CrowdStrike has published a cybersecurity playbook (Playbook) with lessons drawn from this year’s key cyber threats. The Playbook focuses on six common risk areas, including AI, ransomware, perimeter devices, supply chain, zero-day vulnerabilities and cloud and software-as-a-service platforms. It explains common attack targets and vectors, how adversaries leverage vulnerabilities and how organizations can protect themselves with respect to each. This article synthesizes the key takeaways from the Playbook. See “Mitigating Cyber Risks From AI and Ever-Stealthier Adversaries” (Apr. 8, 2026).