Latest Posts › Cybersecurity

Share:

Avoiding growing pains in the development and use of digital twins

Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more

Phishing Subpoenas – A New Privacy Threat?

Privacy issues are inherent in almost all facets of a business — from operations, employment, and technology to customer service, contracts, legal and compliance — all with varying degrees of risk. Most companies mitigate...more

Data Breach 911: Five Immediate Steps to Take

For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more

Cybersecurity Awareness Month: A Basic Primer to Keep Your Data & Information Safe

As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

How Smart Is Your Artificial Intelligence Policy?

There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

How Not to Make a Deal: 5 Key Cybersecurity Concerns in M&A

Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of...more

Cyber Defense: Erin Illman on the 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack

Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North...more

Preparing for the Tidal Wave and Bracing for the Tsunami: Utah Becomes the Fourth State to Pass Privacy Legislation

At last count, at least 39 states have introduced (or passed) comprehensive privacy legislation. After what was previously a watch-and-wait game of legislative whack-a-mole, we are now seeing this legislation get passed and...more

A Fintech Leader’s Thoughts on the North Carolina Regulatory Sandbox Act

As part of Bradley’s continuing coverage of the North Carolina Sandbox Act, we wanted to know what community members and NC fintech aficionados thought about this proposed legislation. We posed six questions to Tariq Bokhari,...more

Technology Boom in NC? What You Should Know About the Proposed Regulatory Sandbox in the Tarheel State

Technology is evolving and advancing at a dizzying pace across the globe. Emerging technologies are reimagining everything from how we interact with each other to how we interact with businesses and institutions. Given the...more

Florida Legislature Considers Sweeping Data-Privacy Legislation Supported by Governor

Florida has joined the wave of states considering new comprehensive data privacy legislation. On February 15, 2021, Rep. Fiona McFarland introduced HB 969, modeled after the California Consumer Privacy Act (CCPA). The bill is...more

Why Some Data Subject Request Services Create Compliance Concerns

If you are responsible for handling data subject requests made pursuant to the EU General Data Protection Regulation or verified consumer requests made pursuant to the California Consumer Privacy Act, chances are you have...more

Chambers Global Practice Guide: Fintech 2021 Trends and Developments

Crisis has set the stage for fintech companies in 2021, creating both new opportunities and potentially unprecedented challenges to innovation. While the coronavirus pandemic continues to accelerate the digital transformation...more

Why It Matters Whether Hashed Passwords Are Personal Information Under U.S. Law

On January 22, 2021, Bleeping Computer reported about yet another data dump by the hacker group Shiny Hunters, this time for a clothing retailer. Shiny Hunters is known for exfiltrating large databases of customer...more

A Year Later: CCPA Compliance Reminder to Review Your Privacy Policy

Has it been a year already? Many businesses diligently made sure they did their best to hit the moving CCPA target as they welcomed 2020 and the effective date of the statute last year. A year ago, all we had were draft...more

Struggle Creates Innovation: Technology and Data Privacy for Contractors

As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more

The Perils of Responding to Cyber-Incidents Just Got More Complicated

It’s 8 a.m., and you just learned that a material cyber-incident occurred in your organization. You fire up your Incident Response Plan. You engage outside counsel, and outside counsel engages a forensic firm. Your company,...more

Shelter-in-Place Orders: Five IT and Cybersecurity Questions to Consider in Light of COVID-19

This is the second alert in a series of Bradley installments on privacy and cybersecurity issues that may arise during the current COVID-19 pandemic. This installment focuses on IT issues that may impact businesses that are...more

Online Learning During COVID-19: FERPA Considerations

This is the third alert in a series of Bradley installments on privacy and cybersecurity issues that may arise during the current COVID-19 pandemic. This installment focuses on privacy concerns related to schools and...more

What You Need to Know About Address Confidentiality Programs

The High-Stakes Compliance Risk You Probably Haven’t Heard Of - While many businesses have been focused on CCPA compliance, there is another set of state privacy laws that may be flying under your organization’s radar. ...more

Tracking Privacy: State Developments to Keep an Eye On

We are a little more than two weeks into the new year and we’ve already seen several states introduce comprehensive privacy legislation on the heels of California’s Consumer Privacy Act (CCPA). It is no easy task to stay on...more

The Top 5 Reasons Your CCPA Work Is Far from Over - Cybersecurity and Privacy Alert

So, you managed to get your California Consumer Privacy Act disclosures and privacy policy up on your website and you can finally take some much-needed rest, right? Think again. And no, it’s not because of the “CCPA-like”...more

42 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide