Cyber Threats

News & Analysis as of

A “Big Deal”: Latest U.S.-China Talks Signal Progress for Protection of Trade Secrets

Expectations didn’t appear high for the latest round of China-U.S. talks about a variety of economic issues including trade secret protection. As previously discussed at TSW, China had not signed onto the Trans-Pacific...more

UK and US carry out cyber-testing exercise

The UK and US Governments have carried out a joint exercise with leading global financial firms to enhance cooperation...more

Threat Intelligence Tools Help Defend Networks

Threat intelligence services provide information about the identities, motivations, characteristics, and methods of attackers. See Rob McMillan, Khushbu Pratap, “Market Guide for Security Threat Intelligence Services,” 3,...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

Report on Student Data Privacy Highlights Two Key Issues For School Leaders

Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more

Alert: Senate Passes Historic Information Sharing Bill

On October 27, the Cybersecurity Information Sharing Act (CISA) finally passed the Senate by a hefty margin of 74–21 (read the text of the bill as passed). Despite an escalation of opposition and rhetoric over the past couple...more

A Compilation of Enforcement and Non-Enforcement Actions

Non-Enforcement - SEC Decides Against Mounting an Appeal in Koch Ruling - The July 2015 ruling by the D.C. Circuit Court in Koch v. SEC will apparently not be challenged by the SEC. The Court ruled in that...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

CFTC Approves NFA Interpretive Notice on Information Systems Security Programs, Including Cybersecurity Guidance

The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

What the Recent NAIC Financial Condition Examiners Handbook Changes Mean for Insurers

On September 21, 2015, the National Association of Insurance Commissioners (NAIC) IT Examination Working Group adopted amendments to the IT section of the Financial Condition Examiners Handbook (“the Handbook”). The changes...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

New DoD Cybersecurity Rule and How Contractors Can Reduce Their Risks

The Department of Defense (DoD) issued an interim cybersecurity rule in August 2015 that, among other things, revises the existing Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity clause and increases...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

“Bug Bounty” Programs Grow In Popularity

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

Cybersecurity and Risk Management: “Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers”

A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

Department of Energy invests $34M in cybersecurity for critical infrastructure

The Department of Energy (DOE) has announced that it will invest $34M to the University of Arkansas and the University of Illinois for two projects designed to “improve and enhance” the protection of the U.S. electric grid,...more

Cybersecurity and Information Sharing Act Clears Senate Hurdle; House Action Unclear

The Cybersecurity and Information Sharing Act (S.754), or CISA, cleared an important hurdle on October 22, 2015 when the Senate voted 83-14 to end debate on several amendments to the bill. CISA creates a cyberthreat...more

Illinois to Host Cyber Risk and Security Conferences; CSBS to Co-host

On October 14, the Illinois Division of Banking announced that it would host two Cyber Risk and Security Conferences on November 9 and November 16. With the growing number of threats to financial data systems, cyber and data...more

SEC Cybersecurity Update

Results from the SEC’s First Round of Cybersecurity Examinations - On February 3, 2015, the OCIE published a risk alert summarizing its findings from its examinations of over 100 registered investment advisers and...more

Mintz TechConnect - Octoer 2015

Letter from the Editors - We are thrilled to provide you with the first issue of Mintz Levin’s TechConnect, a bi-monthly newsletter on “all things technology” in the legal and business world, from our perspective, of...more

186 Results
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.