Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

President Obama Acknowledges Growing Cybersecurity Threats to the Government and Economy, Proposes New Measures to Fight Cyber...

Just days after news broke that ISIS hackers forced the shutdown of the U.S. Central Command’s Twitter account, President Obama met with congressional leadership, members of the Federal Trade Commission and the Department of...more

Two Governmental Regulators Highlight Cybersecurity Issues In 2015 Priorities

It is no surprise that numerous government regulators have listed cybersecurity amongst their priorities for 2015. This past week, two of these regulators – the Securities and Exchange Commission and the Office for Civil...more

The Cyber Security State of the Union: Obama Commits “to Protect a Free and Open Internet”

In last week’s State of the Union address, President Barack Obama continued his ongoing push for nationwide privacy legislation to “better meet the evolving threat of cyber-attacks, combat identity theft, and protect our...more

Cybersecurity in the Workplace: Obama's Proposals and More

In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more

Top Three Trends From 2014 to Influence Government Contractors in 2015

This post is co-authored by Tamara Jack of LMI Government Consulting. Federal government contractors, especially those in the manufacturing sector, continue to experience the economic impact of budget cuts, decreased federal...more

NY Attorney General To Propose Bill To Strengthen Cybersecurity

New York Attorney General Eric Schneiderman is proposing an "overhaul [of] New York's data security law [that would] require new and unprecedented safeguards for the personal data of consumers." The proposal would create new...more

Virtual Currency, Real Risks

CSBS publishes Draft Model Regulatory Framework to promote consistent state regulation of virtual currency activities and protect consumers in the event of a breach. In March 2014, “Mt. Gox,” one of the largest and best-known...more

Congress Begins Discussing Cybersecurity – For Real This Time

Legislators from the House of Representatives will begin work today on figuring out how to protect American companies from cybersecurity breaches.  The panel will host comments from the retail, tech, and marketing industry...more

Blue Edge Lab and the Internet Security Alliance launch new online cybersecurity tool for multinational companies

Blue Edge Lab, a wholly owned subsidiary of DLA Piper LLP (US), in partnership with the Internet Security Alliance (ISA), announced today the launch of CyberTrakSM, a highly innovative online cybersecurity tool featuring...more

President Obama Announces New Legislative Proposal Focused on Improving the Nation’s Cybersecurity

In response to the recent wave of high-profile data breaches, President Obama has revealed proposed legislation aimed at improving the nation’s cybersecurity by increasing certain privacy protections, streamlining the...more

Proposed Personal Data Notification & Protection Act

Leading up to his State of the Union address last week, President Obama proposed a number of federal legislative goals intended to provide a uniform standard as to how data breaches and other related incidents would be...more

State Of The Union “Sneak Peek” Highlights Administration Cybersecurity Initiatives

As part of a series of “sneak peeks” announced in advance of the State of the Union address on Tuesday, January 20th, President Obama made remarks last week before the Federal Trade Commission, the Department of Homeland...more

"Insights Conversations: Cybersecurity"

This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more

Popular Cybersecurity Reads on JD Supra

A reading recap of some of the most well-read Cybersecurity pieces on JD Supra in January, 2015 -- covering a broad range of legal and compliance issues, from cyber insurance to could computing to President Obama's...more

What Obama's Proposed Anti-Hacking Legislation Means for Entrepreneurs

The slew of highly publicized data breaches over the past few years has brought the issue of cyber-security truly to the mainstream -- most recently reaching our living rooms through President Barack Obama’s State of the...more

President Obama Proposes New Data Privacy Legislation

On January 12, President Obama announced new privacy initiatives to combat identity theft, enhance consumer security, and improve data privacy online and in the classroom. His main legislative proposals call for (i) a...more

Department of Defense Updates Its Instruction for Acquisitions of Software and Weapons Systems

On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more

President Obama’s 2015 Priorities Include Cybersecurity

During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more

2014 Mobile Privacy and Security Trends and What to Look for in 2015

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

President Obama Announces New Cybersecurity Proposals

On January 13, President Obama visited the National Cybersecurity and Communications Integration Center to announce a variety of legislative and administrative proposals, many of which were updates to his 2011 Cybersecurity...more

A New Kind of Architecture: The President’s New Agenda on Cybersecurity

If you watched President Obama’s State of the Union Address on January 20, you know that passing comprehensive cybersecurity legislation will be a central focus during his final two years in office. The President actually...more

Dealing with High Risk Data

When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more

Time To Apply A Risk-Based Approach To Information Security Training

Digital warfare seems to be the name of the game these days. Terrorists attack our database infrastructures and wreck havoc by making personal information public. Look at the most recent attacks on Sony, Chick-Fil-A and...more

QATAR 2014: A Year In Review

Qatar Laws and Headlines: - Hamad International Airport: Opened in April 2014 to accommodate 30 million passengers initially. The 60,000-sq.m. facility is expected to handle 8,700 passengers per hour. -...more

Navigating the Cyber Liability Storm - Part II

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

1,359 Results
|
View per page
Page: of 55