Cyber Threats

News & Analysis as of

Senate Creates Cybersecurity Caucus

On June 14, 2016, Senators Mark Warner (D-VA) and Cory Gardner (R-CO) announced the creation of the Senate Cybersecurity Caucus to help coordinate cybersecurity efforts across Senate committees and keep lawmakers and staffers...more

Is The Most Frightening Cyber Trend Numbness Leading to Complacency?

Today’s new cyber world necessitates protection of what is most important to you. The cyber landscape continues to change on a near daily basis and shows no signs of slowing. K2 Intelligence’s Jeremy Kroll and Austin...more

DHS and DOJ Release Updated Guidance for Sharing Cyber Threat Indicators and Defensive Measures

On June 15, in response to feedback from non-federal entities on guidance released in February, the Departments of Homeland Security (DHS) and Justice (DOJ) issued updated guidance for companies about sharing cyber threat...more

Your Organization is Impacted by Ransomware - Now What?

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more

Updated Guidance on the Cybersecurity Information Sharing Act of 2015

Action Item: On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and the U.S. Department of Justice (“DOJ”) jointly issued a notice announcing the availability of the Cybersecurity Information Sharing Act of...more

“Interim” No More: DHS and DOJ Publish Final CISA Guidance on Cybersecurity Sharing

The Department of Homeland Security (DHS) and the Department of Justice (DOJ) have issued the long-awaited final procedures for both Federal and Non-Federal Entities under the Cybersecurity Information Sharing Act (CISA)...more

They Will Click: Cybersecurity and the Human Factor

Cybercrime cost the world economy about $445 billion in 2014 and the 2015 numbers will be even higher. The cost of data breaches will reach $2.1 trillion globally by 2019. Worldwide spending on information security is...more

Data Security Safeguards Can Help Healthcare Employers Withstand Cyberattacks—and Government Audits

The last couple of years have brought a steady rain of bad news for the healthcare industry when it comes to data security: Insurers faced with massive data breaches affecting thousands of health plans and millions of...more

How to Respond to a Cyber Extortion Demand

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization. Among other...more

Tennessee Legislature Amends Data Breach Notification Statute - Encryption is No Longer an Automatic Safe Harbor

On March 24, 2016, Governor Haslam signed S.B. 2005 which amends Tennessee's data breach notice statute. The amended statute will go into effect on July 1, 2016. The new Tennessee breach notice requirements are triggered by...more

2016: The Year of Cyber Insurance?

It has been said that there are two types of companies in the world – those that have been hacked, and those that do not yet know they have been hacked. While perhaps an overstatement, it seems that every day, another company...more

Responding to ransomware attacks: A guide for health care providers

As if data privacy and HIPAA concerns were not enough for health care entities to fret over, enter another data threat that has already caught many health care systems off guard – ransomware attacks....more

U.S. House Committee On Homeland Security Holds Hearing On States’ Preparation For Cyber Threats

On Tuesday, May 24, 2016, the U.S. House Committee on Homeland Security (the “Committee”) held a hearing titled “Enhancing Preparedness and Response Capabilities to Address Cyber Threats.” The hearing was convened jointly by...more

Cybersecurity, Part 3: Identifying solutions

Cybersecurity issues are constantly evolving. Indeed, even since the first article in this series was published, it was announced that plaintiffs law firm Edelson PC has already filed a privacy class action lawsuit against a...more

IAIS Secretary General Considers Path to International Cybersecurity Standard

Last week, the National Association of Insurance Commissioners (NAIC) hosted the 2016 NAIC International Insurance Forum. The Forum addressed topics such as the management of catastrophic disaster risks, industry perspectives...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

The Network and Information Security Directive: Serious Cyber Attacks Will Require Notification

The Council of the European Union adopted the EU Network and Information Security (NIS) Directive (the ‘Directive’) 17 May, ready for final adoption by the European Parliament. The Directive, initially proposed in 2013, has...more

European Council Adopts the Network and Information Security Directive

On May 17, 2016, the European Council formally adopted its position at first reading of the Network and Information Security Directive (“NIS Directive”). The objective of the NIS Directive is to increase cooperation between...more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

CISA Guidance Clarifies How to Share Cyber Threat Information… but Issues Remain

The Cybersecurity Information Sharing Act of 2015 ("CISA"), enacted on December 18, 2015, as part of the omnibus Consolidated Appropriations Act[1], 2016, creates a voluntary process that encourages public and private sector...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

241 Results
|
View per page
Page: of 10
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×