Cyber Threats

News & Analysis as of

Medical Device Cybersecurity: Maybe Dick Cheney Was Not So Paranoid After All

Dick Cheney famously disclosed a few years ago that he had the wireless function of his pacemaker disconnected while he was Vice President because he was concerned that hackers might fiddle with the device remotely and do him...more

Cybersecurity for Medical Devices: A Risk Mitigation Checklist for In-House Counsel

Just this summer, a cybersecurity firm issued a report widely cited in the media detailing cases where unnamed hospitals were allegedly hit by data breaches after medical devices (identified only generically as a blood gas...more

Maryland AG settles with Visionworks over security practices

Using the Maryland Consumer Protection Act, Maryland Attorney General Brian Frosh has announced that eye care retailer Visionworks, Inc. has agreed to pay the state of Maryland $100,000 and enhance its security measures...more

IRS Sued For Failing To Protect Online Taxpayer Data From Hackers

On August 20, 2015, affected taxpayers filed a class action lawsuit in the United States District Court for the District of Columbia against the Internal Revenue Service (the “IRS”) for failing to secure the personal...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Federal Reserve Bank of Cleveland Reports on Online Small Business Lending Focus Groups

The Federal Reserve Bank of Cleveland recently issued a special report on the results of online focus groups it conducted with the Federal Reserve Board “to better understand small businesses’ perceptions of online...more

Cybersecurity as a Regulatory Issue: The NAIC Considers The Anthem Breach And Weighs a “Cybersecurity Bill of Rights”

The Cybersecurity Task Force of the National Association of Insurance Commissioners (the “NAIC”) met last month, as part of on the NAIC’s 2015 Summer National Meeting in Chicago. The Task Force focused on two issues: the...more

California State Auditor Report Reveals Weaknesses In Golden State’s Information Systems

Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more

Russia’s new data law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

9 Key Provisions of Outsourcing Contracts That Matter

Outsourcing, whether technical or process-centric, has become an increasingly important component of businesses of all sizes. Handing over the complexity of ever-changing systems that require increasing expertise can often...more

Third Circuit Affirms District Court’s Decision Asserting FTC’s Authority over Companies’ Data Security Practices

On August 24, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. §...more

ENISA, European cybersecurity agency, releases 2014 annual activity report

On July 28, the European Union Agency for Network and Information Security (ENISA) published its Annual Activity Report 2014. The report summarises its operations and programs from the previous year, and highlights the areas...more

Special Alert: Third Circuit Gives FTC Green Light to Continue Enforcing Corporate Data Security

Last week, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. § 45(a)),...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

Defense Department Issues Interim Rule Requiring Contractor and Subcontractor Reporting of Cyber Incidents

On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more

Protecting financial institutions in cyberspace—U.S. financial regulators come up with a new tool kit to stem cyberthreats

The Federal Financial Institutions Examination Council (FFIEC) has recently developed a new tool to help U.S. financial institutions combat the increasing volume and sophistication of cyber attacks. To blunt threats to a...more

FDA's Cybersecurity Alert Puts Medical Device Users on Notice

On July 31, 2015, the United States Food and Drug Administration (FDA) issued a cybersecurity alert to health care facilities currently using certain infusion pumps manufactured by Hospira, Inc. The alert warns health care...more

House Judiciary Subcommittee Holds Hearing On The Internet Of Things

In a July 29, 2015 hearing, lawmakers asked a panel of witnesses—all industry representatives—about the current and future challenges facing the Internet of Things, and what role, if any, Congress should play in addressing...more

The Vital Role of Cyber Insurance in Protecting a Team’s “Analytic Property”

Professional sports organizations are facing a new off-field risk: potential exposure of their proprietary data. In this new age of data in professional sports, teams are spending millions of dollars on sabermetrics and other...more

Drug Pumps Are Vulnerable to Hacking, FDA Warns

Last Friday, the Food and Drug Administration (FDA) issued a statement warning that certain drug infusion pumps that administer medication to patients are vulnerable to being hacked. The statement focused on the Symbiq...more

2015 US State of Cybercrime Survey released

The 2015 US State of Cybercrime survey has been released and is worth a read. The Survey, co-sponsored by PwC, CSO, the CERT Division of the Software Engineering Institute at Carnegie Mellon University and the United States...more

Cyber-Attacks Against Government Contractors and the Availability of Insurance Coverage

Based on recent cyber-attacks against the United States Office of Personnel Management (OPM) and its subcontractors, USIS and KeyPoint Government Solutions, it is evident that government entities and government contractors...more

We’re All About Sharing Cyber Information: The National Cybersecurity and Communications Integration Center

Amidst the maelstrom of unceasing cyber attacks and intrusions, the National Cybersecurity and Communications Integration Center (NCCIC or Center) assumes a front-and-center role as the government command and communication...more

106 Results
|
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×