News & Analysis as of

Cloud Computing Cyber Threats

Society of Corporate Compliance and Ethics...

Cyber Threats

The cyber landscape these days can be terrifying. Malware, ransomware, spyware, phishing, cloud-based computing and so much more are enough to keep even a compliance veteran up all night. There are other risks to consider,...more

Foley & Lardner LLP

Where is Cloud Computing Heading in 2023?

Foley & Lardner LLP on

The cloud computing market has grown at a rapid rate and is expected to continue that trajectory for years to come. With this increasing demand, it is important to stay up to date on the latest trends and technologies so you...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Wiley Rein LLP

Tech Risk Assessments: Cloud Services Under the Microscope?

Wiley Rein LLP on

The old saying goes, personnel is policy. This may be particularly true at this point in federal cybersecurity policy, where multiple agencies and Congressional committees play changing roles, including expanding capacities...more

Pillsbury Winthrop Shaw Pittman LLP

December 31, 2017 Deadline for Cybersecurity under DFARS 252.204-7012 Re-Interpreted

The DoD clarifies its expectation for full compliance to protect Controlled Unclassified Information (CUI) residing on Contractor Systems from cyber incidents. A defense contractor’s updated and current System Security...more

Foley Hoag LLP

Cybersecurity 2017: The Year in Preview

Foley Hoag LLP on

Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

Alston & Bird

The Digital Download - Privacy & Data Security Monthly Newsletter - January 2016

Alston & Bird on

Senior Counsel Peter Swire to Debate European Privacy Activist Max Schrems. The debate, set to take place on January 26 in Brussels, will highlight key differences between certain European and U.S. attitudes towards U.S....more

Orrick, Herrington & Sutcliffe LLP

DoD Cybersecurity Rules Expand Contractors’ and Other DoD Awardees’ Obligations to Safeguard Sensitive Data and Report Cyber...

The United States Department of Defense (“DoD”) recently published two new rules that impose broader obligations to safeguard information that falls within specified categories of sensitive data and to report cyber incidents...more

Perkins Coie

New DoD Cybersecurity Rule and How Contractors Can Reduce Their Risks

Perkins Coie on

The Department of Defense (DoD) issued an interim cybersecurity rule in August 2015 that, among other things, revises the existing Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity clause and increases...more

Carlton Fields

FFIEC Weighs in on Cybersecurity in Light of Unprecedented Risk of Cyber Threats

Carlton Fields on

As financial institutions of all sizes continue to face unprecedented cybersecurity risk, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. The Assessment is...more

King & Spalding

DHS Awards Grant for Research In New Potential Target Area for Cyber-attacks

King & Spalding on

On September 2, 2015, the University of Delaware announced that Professor Haining Wang had received a three-year, $2 million grant from the Department of Homeland Security (“DHS”) to investigate energy and power safety in...more

Robinson+Cole Data Privacy + Security Insider

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

Pillsbury - Global Sourcing Practice

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 2

This blog is the second part of a two-part series on key contracting issues with technology service providers, and the focus is specifically geared toward companies doing business in the real estate industry. As noted in Part...more

Holland & Knight LLP

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

Holland & Knight LLP on

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

King & Spalding

Defense Department Issues Interim Rule Requiring Contractor and Subcontractor Reporting of Cyber Incidents

King & Spalding on

On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide