Cyber Threats

News & Analysis as of

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

CISA Guidance Clarifies How to Share Cyber Threat Information… but Issues Remain

The Cybersecurity Information Sharing Act of 2015 ("CISA"), enacted on December 18, 2015, as part of the omnibus Consolidated Appropriations Act[1], 2016, creates a voluntary process that encourages public and private sector...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

Boston Fed President Comments on the “Ever-Changing” Nature of Cyber Risk

On April 4, the Federal Reserve Bank of Boston’s President Eric S. Rosengren delivered remarks at the 2016 Cybersecurity Conference. Rosengren commented on the status of the U.S. economy and the “ever-changing” nature of...more

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

Open Communication and Collaboration Make Campus Networks Vulnerable to Cyberattack

Institutions of higher education face growing threats from cyber attackers. Instances of attacks on universities are increasing, with recent large-scale attacks at some of the country's top universities. Approximately one...more

Listen up white-hats–Uber is paying bug bounty

Uber recently announced that it has launched a bug bounty program that will pay white-hat hackers up to $10,000 for exposure of information that identifies “critical issues,” such as Social Security numbers, credit card...more

To Share or Not to Share (with the Government)? That is the Question: DHS Announces Interim Guidelines for Sharing Cyber Threat...

On February 16, 2016, Secretary of Homeland Security Jeh Johnson announced interim guidelines and procedures for sharing cyber threat indicators under the Cybersecurity Information Sharing Act of 2015 (“CISA”). Because the...more

Beware of Email Requests from the C-Suite to Transfer Employee Data

Human Resources and payroll professionals are being targeted by sophisticated cyber criminals to steal employee data. The email phishing scam works like this: the bad guy sends an email to employees in the human resources or...more

CISA Guidelines (Part 3): Guidance to Assist Non-Federal Entities

As we wrote previously, the federal government released several guidance documents last month implementing The Cybersecurity Information Sharing Act (CISA). Among these was the Guidance to Assist Non-Federal Entities to...more

Cybersecurity Information Sharing Act of 2014: What does it allow?

The Cybersecurity Information Sharing Act of 2014 was created to identify and share cyber threat indicators, which are pieces of information necessary to describe or identify “malicious reconnaissance;” a method of defeating...more

Cyber Risks and Insurance in the Marine Industry

The first wireless radio equipment was used aboard Lightship 70 in 1899. Over the next 115 years, the use of technology in the maritime domain has driven rapid change in the United States Coast Guard’s operating environment —...more

TruShield report says more cyber-threats in 2016 than ever before

TruShield released its 2015 Annual Cyber Threat Intelligence Report, and the outlook: 2016 will see even more ransomware and phishing attacks than last year. And guess who is facing the biggest threat? Law firms. Paul...more

Cybersecurity: What You Must Know and What You Must Do

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial...more

HHS Seeks Nominees for New Health Care Cybersecurity Task Force; Nominations Due March 9

HHS is forming a new “Health Care Industry Cybersecurity Task Force” as part of the Administration’s effort to improve preparedness for cybersecurity threats affecting the health care industry. HHS is accepting nominations...more

UK Financial Regulatory Developments - March 2016 #1

IOSCO reports on risk in the securities markets - IOSCO has published the 2016 edition of its Securities Markets Risk Outlook report, identifying and examining key trends in global financial markets and the potential...more

DHS/DOJ Issue Guidance on Cyber Threat Info Sharing

On February 16, 2016, the Department of Homeland Security (DHS) and Department of Justice (DOJ) issued “guidance” to assist federal agencies and non-federal entities in implementing the Cybersecurity Act of 2015.  The Act was...more

Department of Homeland Security Publishes CISA Procedures and Guidance

On February 16, the DHS published guidance for both private and federal entities on the sharing of cyber threat indicators with the federal government. As required by the Cybersecurity Information Sharing Act of 2015 (CISA),...more

What You Need to Know About the Cybersecurity Act of 2015

Legislation may change the way government and the private sector collaborate on cybersecurity. After years of vigorous debate and numerous false starts, in the closing hours of its 2015 session, the US Congress...more

Cyber Threat Information Sharing Guidelines Released by DHS

This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators...more

Draft Investigatory Powers Bill 2015

On 4 November 2015 the Home Secretary published a Draft Investigatory Powers Bill (the “Bill”), emphasising its importance in combating the increasingly sophisticated communication technologies used by criminals to intercept,...more

237 Results
|
View per page
Page: of 10
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×