News & Analysis as of

Cloud Computing Data Protection Risk Management

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Proskauer on Privacy

“Log4Shell” Vulnerability Has Potential to Compromise Millions of Devices

Proskauer on Privacy on

Cybersecurity experts around the world are scrambling to sound the alarm about a newly discovered security vulnerability that could be used by attackers to easily infiltrate computer systems. The vulnerability is found in...more

Society of Corporate Compliance and Ethics...

Chris Ford on Compliance and Cloud Computing

While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more

Epiq

More Tech, More Problems? New ABA Rules on Professional Conduct for Working Virtually Provide Guidance

Epiq on

In March, the American Bar Association (ABA) released a lengthy opinion on virtual practice. Formal Opinion 498 states that while the ABA Model Rules of Professional Conduct allow lawyers to conduct their practice virtually,...more

Robinson+Cole Data Privacy + Security Insider

U.S. Chamber of Commerce and FICO Release Security Guidelines on Telework During COVID-19

It is no secret that companies are experiencing an increase in security incidents following the transition from work in the office to work from home during the pandemic. There are a number of causes, including the difficulty...more

Baker Donelson

Critical Guidance for Financial Institutions on Security Considerations for Cloud Computing Environments

Baker Donelson on

On April 30, 2010, the Federal Financial Institutions Council (FFIEC) issued Guidance on the use of cloud computing services and security risk management principles in the financial services sector. The Guidance reminds...more

White & Case LLP

Working from home – A checklist of the IT risks and exposures

White & Case LLP on

As the COVID-19 disease continues to spread, many countries have implemented nationwide lockdowns and many businesses have mandated employees to work from home. Even with the relaxation of lockdowns in different parts of the...more

Proskauer - New Media & Technology

Work-Outs of Technology and Services Agreements Challenged by COVID-19

In early February 2020, before most of us were truly aware of the implications of COVID-19, a well-respected IT consulting group predicted a $4.3 trillion global spend on information technology in 2020. Drivers of the...more

The Volkov Law Group

Living in the Cloud: Practical Approaches to Cybersecurity Risks (Part III of III)

The Volkov Law Group on

Businesses are increasingly relying on the cloud to store confidential and sensitive information.  One-third of information technology budgets are used for cloud services.  Rapid growth in cloud storage is expected over the...more

Burns & Levinson LLP

Should You Go “All In” with the Cloud? (And How to Manage That Risk)

Burns & Levinson LLP on

While references to “the cloud” and “cloud computing” are significantly more familiar than they were five years ago, it remains clear that many organizations implement cloud resources ineffectively – or at least do not...more

BCLP

Cloud Computing

BCLP on

Most companies today use some form of cloud computing whether through software-as-a-service, platform-as-a-service, or infrastructure-as-a-service. Cloud computing’s cost-effective scalability can offer significant advantages...more

Winstead PC

Is it HIPAA or HIPPA? Either way, it still applies.

Winstead PC on

I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more

BCLP

Cloud Computing (Update)

BCLP on

Most companies today use some form of cloud computing whether through software-as-a-service, platform-as-a-service, or infrastructure-as-a-service. Cloud computing’s cost-effective scalability can offer significant advantages...more

Robinson+Cole Data Privacy + Security Insider

Forrester Cyber Predictions for 2017: Harsh Reality

Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

WilmerHale

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

WilmerHale on

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

Orrick, Herrington & Sutcliffe LLP

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide