Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Popular Cybersecurity Reads on JD Supra

A reading recap of some of the most well-read Cybersecurity pieces on JD Supra in January, 2015 -- covering a broad range of legal and compliance issues, from cyber insurance to could computing to President Obama's...more

2014 Mobile Privacy and Security Trends and What to Look for in 2015

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

President Obama Announces New Cybersecurity Proposals

On January 13, President Obama visited the National Cybersecurity and Communications Integration Center to announce a variety of legislative and administrative proposals, many of which were updates to his 2011 Cybersecurity...more

A New Kind of Architecture: The President’s New Agenda on Cybersecurity

If you watched President Obama’s State of the Union Address on January 20, you know that passing comprehensive cybersecurity legislation will be a central focus during his final two years in office. The President actually...more

Dealing with High Risk Data

When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more

Time To Apply A Risk-Based Approach To Information Security Training

Digital warfare seems to be the name of the game these days. Terrorists attack our database infrastructures and wreck havoc by making personal information public. Look at the most recent attacks on Sony, Chick-Fil-A and...more

QATAR 2014: A Year In Review

Qatar Laws and Headlines: - Hamad International Airport: Opened in April 2014 to accommodate 30 million passengers initially. The 60,000-sq.m. facility is expected to handle 8,700 passengers per hour. -...more

Navigating the Cyber Liability Storm - Part II

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Navigating the Cyber Liability Storm Part I

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Proposed Data Breach Legislation Announced

President Obama’s new proposed Personal Data Notification and Protection Act provides a national standard for companies responding to security breaches....more

World Economic Forum Releases Framework to Quantify Cyber Threats

In conjunction with its annual meeting this week, the World Economic Forum released a report on its current efforts to develop a common framework to model and quantify the impact and risk of cyber threats. The report...more

Privacy and Data Security 2015: President Obama’s Mandate for a Strong Tight-Knit Legislative Framework

In his January 20 State of the Union address, President Obama said, “We are a strong, tight-knit family who has made it through some very, very hard times.” This statement was used as a theme for the economic initiatives set...more

2015 State of the Union: Cyber, Data and Privacy Issues

President Obama's State of the Union address highlighted the importance of cybersecurity, data security and privacy to his 2015 agenda: "No foreign nation, no hacker, should be able to shut down our networks, steal our...more

Cloud Computing: Legal Issues on the Horizon

In the May 2014 issue of the Business Litigation Report, we discussed a hot topic in law and technology: cloud computing. That topic did not cool down over the summer. Businesses and courts—including the Supreme Court—have...more

Two-Factor Authentication Is a Necessity for Companies

It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more

Missed Davos? Catch up online with the forum’s top Internet issues

If you care about the latest in Internet policy, you probably wish you were side by side with industry and world leaders at the World Economic Forum in Davos, Switzerland — maybe participating in a panel with Bill Gates,...more

Cybersecurity and Privacy in State of the Union Address

As expected in his State of the Union address last night, President Obama made it very clear that cybersecurity is on his agenda for 2015. After stating that: “No foreign nation, no hacker should be able to shut down...more

President Calls on Congress to Pass Cybersecurity, Data Breach Bills; Congress Begins Action on the Issue

In his sixth State of the Union Address to Congress, President Obama again called on Congress to strengthen the nation’s cybersecurity laws and enact a federal standard for data security and breach notification. Speaking...more

#SOTU2015: Employment, Immigration, Cyber Safety, and Education in a New Era

On the evening of January 20, 2015, President Obama delivered his sixth State of the Union address in the chamber of the U.S. House of Representatives with Supreme Court justices, members of Congress, the president’s...more

Mainbrace - January 2015 No. 1

In this issue: - A Sea Change Sweeps over Congress: A Look Back and a Look Ahead - Shipping & International Trade Law (Second Edition 2015) - Congress Passes Coast Guard Bill in Waning Hours of 113th...more

Tips for Protecting Your Data

With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more

Five 2015 Corporate Compliance / Litigation Issues Manufacturers Need To Keep An Eye On

It is our annual tradition at the beginning of each year to report on significant issues that face manufacturers/distributors in the year ahead.  Two weeks ago, Matt reported on significant issues in the labor/employment...more

Cybersecurity: The Obama Administration Proposes Legislation - Proposals Would Standardize Breach Notification Requirements,...

On January 13, 2015, in response to the continuing onslaught of cyber attacks, including the recent cybersecurity attack and data loss at Sony Pictures Entertainment, the Obama Administration sent to Congress three...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

President Obama Unveils Plans About Cybersecurity

Written by Sydney White President Obama made a series of announcements on cybersecurity, data security, and privacy that will be incorporated into his State of the Union address tonight.  In conjunction with the...more

1,342 Results
|
View per page
Page: of 54