News & Analysis as of

Cybersecurity

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

WannaCry Global Ransomware Attack: What You Need to Know

by Shearman & Sterling LLP on

The WannaCry ransomware attack was first reported on Friday, May 12. Within hours, it shut down thousands of computer systems, locking users out of their own files. The latest report estimates over 300,000 computers in 150...more

Target Reaches $18.5 Million Dollar Settlement in Data Breach with States

It seems as though we have been writing about this case for a lifetime. Target Corporation’s data breach saga came one step closer to a conclusion this week. On Tuesday, Target reached an $18.5 million settlement with 47...more

New York & Colorado Propose “New” Cybersecurity Regulations for Broker-Dealers

by Wilson Elser on

In the wake of the promulgation of new cybersecurity regulations by New York State’s Department of Financial Services, Colorado has proposed cybersecurity regulations for broker-dealers, investment advisers and other fund...more

Rite Aid’s Online Store Breached

Rite Aid has admitted that its online eCommerce platform was accessed by unauthorized individual(s) from January 30, 2017, through April 11, 2017, and their customers’ names, addresses and payment card information, including...more

A New Member in the Big Club – New Mexico Becomes the 48th State with a Breach Notification Law (+ Disposal and Service Provider...

by Locke Lord LLP on

Effective June 16, 2017, New Mexico will join 47 other states (as well as the District of Columbia, Guam, Puerto Rico, and the Virgin Islands) by imposing breach notification requirements on entities experiencing information...more

Great Employee or Insider Threat?

by Seyfarth Shaw LLP on

As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He...more

Deeper Dive: Security Is a Big Deal for Big Data

by BakerHostetler on

In the rapidly expanding landscape of Internet-based data analytic services, companies across all industries with a significant online presence have faced or will face a data breach resulting from their collection and use of...more

Ransomware Attack Hits Dallas Senior Living Community

No industry is immune from ransomware attacks—including senior living communities. Senior living communities have exploded now that baby boomers are selling homes, down-sizing and getting ready for that stage of life....more

Fallout from Target’s 2013 Data Breach includes an $18 Million Multistate AG Settlement

by Kelley Drye & Warren LLP on

Target Corporation agreed to an $18.5 million settlement with 46 State Attorneys General and the Attorney General of the District of Columbia this week, resolving allegations that the company failed to provide reasonable data...more

Fourth Circuit Court of Appeals Allows Wikimedia Upstream Suit to Proceed

by Alston & Bird on

On May 23, 2017, the Fourth Circuit Court of Appeals issued its opinion on Wikimedia foundation v. NSA/CSS. The Court vacated and remanded the NSA’s previously successful motion to dismiss Wikimedia’s Fourth and First...more

Where Does One Find Bitcoin to Pay the Hacker When Your Computer is Locked? An ATM, Of Course!: Cybersecurity Trends

by CloudNine on

Needless to say, cybersecurity and its challenges have become even more of a hot topic than ever, with ransomware stories becoming more prevalent. If you want to learn more about how to prevent ransomware attacks, read...more

Officer and director checklist: Complying with the global reach of the New York Department of Financial Services Cybersecurity...

by White & Case LLP on

The New York State Department of Financial Services (NYDFS) issued Cybersecurity Requirements for Financial Services Companies (the "Cybersecurity Regulation") effective March 1, 2017. The regulation imposes tight compliance...more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

China's revised draft data localisation measures

by Hogan Lovells on

On 19 May 2017, the Cyberspace Administration of China (the “CAC“) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures...more

Executive Order Establishes American Technology Council

by Locke Lord LLP on

On May 1, 2017, President Trump signed the Presidential Executive Order on the Establishment of the American Technology Council (the ATC EO). The ATC EO is intended to “promote the secure, efficient, and economical use of...more

Executive Order 13800 – Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

President Donald J. Trump signed Executive Order 13800 titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” on May 11, 2017, his thirty-fifth executive order since taking...more

PRC Cybersecurity Law - one week to go, and there are still new developments

by DLA Piper on

The final countdown is on. The PRC Cybersecurity Law comes into force on 1 June 2017. This date marks a significant evolution in both the legal and enforcement environment for data protection in China, and organisations can...more

Actions You Can Take to Protect Your Systems and Data from a Cyber Attack

by Miles & Stockbridge P.C. on

As a follow up to our cyber security alert from last week, preparing to protect against an event like the recent “WannaCry” global ransomware attack can include a range of IT, business operations and legal steps....more

Cybersecurity Lessons from the United States: A Guide for Directors and Officers

by Bennett Jones LLP on

The recent global ransomware attack (WannaCry) was yet another reminder of the increased threat posed by cyber breaches. While cybersecurity attacks are inevitable, organizations (and their directors and officers) may still...more

Do Recent Events Make You “Wanna Cry”? - Massive ransomware attacks are just another reason to have robust cyber insurance in...

On May 12, a massive ransomware cyber-attack infected over 100,000 computers in more than 150 countries. This malware, a Trojan virus known as “WannaCry,” “WanaCryptor,” or “Wcry,” encrypts files, and then threatens to...more

WannaCry Also Encrypted Hospital Medical Devices

The fall-out from WannaCry continues, particularly in the healthcare sector. There are new reports that WannaCry affected at least two hospital systems in the U.S. and encrypted medical devices (power injector systems)...more

Testing the Limits II – Cyber Coverage Litigation Keeps on Rolling

by Locke Lord LLP on

As cyber risks continue to evolve, resulting insurance claims continue to implicate a variety of types of policies. Although many claims are addressed without lawsuits being filed, some are not. And while not all coverage...more

Trump Executive Order Addresses Executive Branch, Critical Infrastructure Cybersecurity

by Dechert LLP on

President Donald J. Trump issued an Executive Order on May 11, 2017 aimed at “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” (the “Order”). The Order mandates federal governmental review of...more

Chinese Regulators Increase Supervision of Internet News

by Davis Wright Tremaine LLP on

Several years ago, internet news in China was published almost entirely through internet portals. Today there are many additional news channels, including mobile apps, microblogs, official accounts, etc. In response to this...more

4,457 Results
|
View per page
Page: of 179
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!