Latest Posts › Cybersecurity

Share:

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Can Artificial Intelligence assist with cybersecurity management?

AI has great capability to both harm and to protect in a cybersecurity context. As with the development of any new technology, the benefits provided through correct and successful use of AI are inevitably coupled with the...more

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

SEC Adopts Final Rules to Enhance Cybersecurity Disclosure

On July 26, 2023, the SEC adopted new rules to enhance and standardize disclosures pertaining to cybersecurity risk management, strategy, governance, and material cybersecurity incidents. The SEC's decision to introduce...more

New Data Privacy Laws Now Playing at a Theatre Near You (or Coming Soon): Are You Ready?

2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more

State of US Data Privacy Law Compliance

In May 2017, the world of data privacy was irreparably changed when four members of the Chinese military hacked into credit-reporting company Equifax, exposing the personal information of nearly 150 million Americans. The...more

[Webinar] Moving Targets While Under Fire – Aligning with New Data Laws While Hackers and Customers Bring Pressure - April 5th,...

In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more

Hidden Threats of Exposing Your Phone Number

This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more

Hacking Is Changing: Should Our Data Security Change?

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Important Updates For Businesses That Transfer Data From Europe: European Commission Adopts New Standard Contractual Clauses

Top 3 Takeaways - On Friday, June 4, 2021, the European Commission adopted two sets of standard contractual clauses, one for use between controllers and processors and one for the transfer of personal data to “third...more

Amazon Sidewalk Shares Your Home WiFi with the Neighbors

We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us.  We also know that it records private conversations...more

FBI Privacy App Lures Criminals

If you want to keep tabs on criminals, build them a clubhouse. Provide them a comfortable place to relax and discuss their business, and you can learn about their contacts and activities. The strategy is not new....more

Unpacking the President’s Executive Order on Digital Security

Last week this blog discussed the gap between what businesses can afford to spend on protecting their own data and what hostile governments can spend to attack them. We observed that the U.S. government is already helping to...more

The Commercial Gap in Digital Security

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

Schrems II, Reverse Schrems, and Schrems with a Half-Twist from the Pike Position

Just when you thought it was safe to send your data across the water, the distinctive dorsal fin of Schrems II breaks the surface. The EU, who can barely be convinced that the UK’s data privacy law is “adequate” despite...more

In-house Roundhouse: Antitrust and the Tech Industry [Audio]

Stephanie Lambert, Chief Compliance Counsel with NetScout Systems, Inc., and Womble Bond Dickinson partner and veteran cyber attorney Ted Claypoole talk with host and business litigator, Mark Henriques, about the current...more

The Era of Retail Biometric AI Crime Has Begun

Each new technology seems to offer creative tools for both criminals and law enforcement.  Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more

The Worm Turns on Big Tech, New Types of American Threats

I have written recently about the crashing tsunami of change in legal attitudes toward the largest U.S. data, technology and internet companies, especially in the antitrust realm. As we consider whether GAFA critic Tim Wu...more

Data Localization and the Limits of “Everything from Everywhere”

The movement to localize some or all of internet data has grown over the past five years as countries introduce new laws restricting data flows, and others try to boost local businesses by placing burdens on international...more

The UK Sets Out to Prove That You Are You

There is a reason we don’t all have a definitive digital identifier. I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more

One Transaction Generates Data to Feed Multitudes

Last week I jumped from the starting point of the newest U.S. anti-trust action against Google into a discussion about the legal and economic status of data. I would like to carry the discussion of data further....more

EU Data Localization Would Hurt U.S. Businesses

Stung by Brexit and set adrift by a neglectful U.S. foreign policy, the European Union has started to explore new ways of breaking away from the rest of the world, including taking steps to cordon EU data into locally managed...more

IoT Security Reaches Center Stage in U.S.

How is a refrigerator like a stoplight camera and a delivery drone? Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more

Evolution of Personal Data in U.S. Law

Definitions are important. How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more

Zoom Settles with the FTC on Video Surveillance and Encryption Overstatement

The Federal Trade Commission (“FTC”) conducted an investigation into Zoom Video Communications, Inc.’s (“Zoom”) privacy and security practices and announced a settlement agreement on November 9, 2020. As a part of the...more

63 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide