News & Analysis as of

Cyber Threats

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

Are Industrial Control Systems the Linchpin for Critical Infrastructure Cybersecurity?

by BakerHostetler on

Over the past few months, news headlines around the globe have been littered with reports of cyberthreats to the critical infrastructure of countries of all sizes. What were once just ominous theories of catastrophic...more

Senate Introduces the Internet of Things (IoT) Cybersecurity Improvement Act of 2017 for Government-Acquired IoT Devices

by Balch & Bingham LLP on

On August 1, 2017, the Senate introduced the “Internet of Things (IoT) Cybersecurity Improvement Act of 2017”, which aims to bolster the security of government-acquired IoT devices. Sponsored by Sens. Mark Warner (D-VA),...more

Senate Bill Tackles Threat From Poorly Secured IoT Devices

by Fox Rothschild LLP on

A bipartisan group of Senators wants to make it more difficult for hackers to enlist smart thermostats, wireless security cameras and other connected devices in future cyberattacks. ZDNet reports that Sens. Mark Warner...more

If You SEC Something, Say Something

Just about every survey of General Counsels reveals the same #1 culprit of sleepless nights….. a cybersecurity hack. If you run a business in today’s global environment, it is hard to escape the fundamental reality that it is...more

Banking & Financial Services - July 2017

by Burr & Forman on

What does a recent Georgia Supreme Court case mean for the viability of the state's confirmation statute? Atlanta Partner Erich Durlacher explores answers in this Alert. Please see full E-Note below for more information....more

Computer Viruses Have Evolved: Have Your Antivirus Contract Warranties Kept Up?

by McGuireWoods LLP on

By many accounts, 2017 is the 35th anniversary of widely propagating computer viruses. The recent “WannaCry” and “NotPetya” ransomware outbreaks demonstrate that computer viruses (or more broadly, “malware”) are still...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

by Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

At the Intersection of Cybersecurity and White Collar

by Blank Rome LLP on

The global "ransomware" cyberattack in early May 2017 resulted in tens of thousands of computer systems being taken hostage by hackers and, in the instances involving hospitals, put lives at risk. Companies that suffered...more

SEC Chairman Clayton Talks Cyber Threats And Responses

by King & Spalding on

On July 12, 2017, U.S. Securities and Exchange Commission Chairman Jay Clayton made his first public speech as head of the Commission, emphasizing the need for coordination between companies and regulators to thwart cyber...more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

Buyout Firms Must Take Action to Respond to Global Cyber Threats

by Latham & Watkins LLP on

Cybercrime has become a critical issue for buyout firms as hackers are increasingly targeting sensitive business data to profit from insider knowledge. According to a Private Funds Management survey of 91 PE houses, 54% of PE...more

National Cyber Security Alert

by Clark Hill PLC on

The continuing increase of cyber-crime and the almost daily reports of hacking attacks against businesses, government agencies, and citizens highlight the persistence of this escalating national security and corporate threat....more

Law Firms’ Data Duty: Protecting Client Information From Cybercriminals

by McGuireWoods LLP on

July 1, 2017 The impact from the recent Petya/NotPetya ransomware attack — or what was reported as a ransomware attack but now appears to be something even more damaging — continues to spread around the globe, with several...more

Law Firms Beware – Ransomware: 9 Tips To Avoid Cyber Attack

by Kramm Court Reporting on

Upon listening to a panel of cybersecurity experts, I came to the conclusion that law firms and court reporting firms are vulnerable to the most prevalent cyber attack, ransomware. Ransomware is defined as “a type of...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Petya Ransomware Attack Has No Kill Switch

On the heels of the WannaCry ransomware attack last month, a new ransomware variant, Petya, hit organizations around the world on Tuesday and stopped them in their tracks—including a major law firm. This keeps us up at night...more

Answers About The Most Recent Worldwide Ransomware Attack

by Fox Rothschild LLP on

Yesterday's worldwide cyberattack once again exploited a vulnerability that has been known to experts for many months. These attacks are sure to continue and the best defense is knowledge. Awareness of how malware works and...more

Ransomware: How Can You Fight Back?

by Fox Rothschild LLP on

Ransomware is back in the news. Yet again, massive and not-so-massive corporate enterprises find themselves at risk of having their computer systems and records held hostage to internet raiders. And, in an added twist, this...more

Disgruntled Employees and Other Internal Threats to Your Cyber Security

by Baker Donelson on

Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more

Girl Scouts Issue Cybersecurity Badges for Girls in K-12

If you have a daughter in K-12 who is in the Girl Scouts, check out the fact that they can now earn cybersecurity badges if they demonstrate a mastery of Internet security. Brilliant! What a great way to get girls interested...more

Senate Subcommittee Focuses On State-Sponsored Cyber Threats

by King & Spalding on

On June 13, 2017, the Senate Foreign Relations Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy held a hearing entitled “State-Sponsored Cyberspace Threats: Recent Incidents and U.S. Policy...more

Malware Capable of Shutting Down Electric Grids Confirmed

by Hogan Lovells on

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more

Filling in the Gaps on Medical Device Cybersecurity

by Hogan Lovells on

Cybersecurity has become a hot button topic for many in the medical device industry following the announcement of several high-profile medical device vulnerabilities and in light of the recent WannaCry ransomware attack that...more

378 Results
|
View per page
Page: of 16
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.