Cybersecurity Lobbying Booming: How Law Firms Can Profit
How to Protect Your Company From Hackers
Vague Definitions in CISPA Raise Concerns of SOPA 2.0
There’s no denying that the present-day Internet, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As stated by one recent commentator: “Cybercrime is raging...more
In a recent panel discussion, one of the speakers was a so-called "ethical hacker" - a hacker-turned-protector of employers' confidential information. As someone at the forefront of cyberattacks, the ethical hacker's opinion...more
April 5 (Bloomberg Law) -- In recent months, a wave of lawyers and consultants have taken to lobbying various members of the federal government on cybersecurity issues. David Ransom, partner at McDermott Will & Emery, talks...more
As technology advances, so do efforts to exploit technology for both legal and illegal endeavors. As criminal defense attorneys in Cleveland, our law firm defends those accused of Internet crimes with ties to Ohio....more
March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent
the loss of trade secrets and threats to national security says...more
On 7 February, the European Commission (EC) published an EU Cyber Security Strategy encompassing a proposed Directive on Network and Information Security (NIS Directive). The aim of the Strategy and NIS Directive is to...more
Full text copy of President Obama's executive order calling for greater protections against cybersecurity risks, as mentioned in his Feb 12, 2013, State of the Union address.
The order is meant to bring more security and...more
(LONDON) The European Commission recently published a draft “Cybersecurity Directive” which aims to increase the level of preparedness across the EU to deal with threats to network and information security. The Directive...more
Back in September, I posted here about Senate Commerce Committee Chairman John D. Rockefeller’s (D-WV) letters to all FORTUNE 500 companies inquiring about business opposition to cybersecurity legislation....more
As our reliance on technology grows, companies face increasing risk of exposure to cyber breaches. The following outlines some of the risks your business faces and explains why you should implement strategies to manage your...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
Despite increasing cyber attacks, significant losses from operational downtime, and further governmental regulation, companies are still not taking measures for basic responsibilities for cyber governance, or even securing...more
The Cyber Intelligence Sharing and Protection Act (“CISPA”) is a pending legislative proposal aimed at protecting against cyber-threats and cyber-attacks. CISPA follows the much publicized and now effectively defunct...more
On April 26, 2012 the House passed the Cyber Intelligence Sharing and Protection Act (“CISPA”) on a 248 – 168 vote. CISPA is supported by many communications and technology companies (e.g., Verizon, AT&T, Facebook, and...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo