Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

NAIC Task Force Releases Revised Draft Insurance Data Security Model Law

On August 17, the National Association of Insurance Commissioners (the NAIC) Cybersecurity (EX) Task Force (the Task Force) released for comment a revised draft Insurance Data Security Model Law (the Model Law). This Model...more

Locky Ransomware Continues to Hit Health Care Entities

FireEye Labs has reported that the Locky ransomware continues to hit the health care industry hard, and has increased in the month of August. Although the telecommunications, manufacturing and aerospace/defense...more

Hackers Dubbed ‘Ghoul’ Targeting Industrial Businesses across the Globe

Researchers at Kapersky Labs say they have uncovered an industrial hacking scheme that they have dubbed “Operation Ghoul” that has hit 130 organizations in 30 countries. ...more

Cybersecurity Risks to the Manufacturing Sector

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more

Rules of the (International) Road, Brexit, PPP as a New Tool for Argentina, and Keeping Non-U.S. Companies Safe from Suit (Expect...

- Post-Daimler: Are Non-U.S. Companies Safe from Suit in U.S. Courts? What if the Non-U.S. Parent Registers to Do Business in a State? - Rules of the (International) Road: Choosing and Appointing a Distributor ...more

Also In the News - Data, Privacy, & Security Practice Report - August 2016

FDIC Office Of Inspector General Reports On FDIC’s Cybersecurity Practices – On August 11, 2016, the Federal Deposit Insurance Corporation’s (“FDIC’s”) Office of Inspector General issued a report based on an audit of the...more

The Goal of Gender Equality in Cybersecurity

I have the privilege of teaching the Privacy Law class at Roger Williams University School of Law (RWU). It is a required course for the school’s Joint Masters in Cybersecurity/Juris Doctor program, which is, to my knowledge,...more

NAIC Exposes Second Draft of Insurance Data Security Model Law

On August 17, 2016, the National Association of Insurance Commissioners’ Cybersecurity Task Force of the Executive Committee exposed for comment the second draft of the Insurance Data Security Model Act. The second exposure...more

Latest Data Breach Settlement Illustrates Need for Companies to Prioritize Cybersecurity

On Aug. 5, 2016, the New York attorney general, Eric Schneiderman, announced a $100,000 settlement with an e-retailer following an investigation of a data breach that resulted in the potential exposure of more than 25,000...more

NAIC Cybersecurity Task Force Weighs Credit Freezes

On May 24-25, the NAIC Cybersecurity (EX) Task Force held an interim meeting to hear comments from various industry trade organizations and other interested parties on the proposed Insurance Data Security Model Law exposed...more

Health Care E-Note - August 2016

The Alabama Natural Death Act contains the provisions on how an individual may plan for end-of-life decisions. Specifically, it outlines the requirements for a valid Advanced Directive and the removal and withdrawal of life...more

Department Of Commerce Agency Seeks Standards For IoT Security

On August 2, the National Telecommunications and Information Administration (“NTIA”), an agency of the Department of Commerce, announced that it would form a multi-stakeholder group to increase transparency for the deployment...more

Defending a Data Breach Investigation by the Federal Trade Commission

Your company has experienced a data breach, and the Federal Trade Commission (“FTC”) notifies you that it is initiating a non-public investigation. How the company responds can significantly affect the course of the...more

Eddie Bauer Latest Victim of POS Malware Attack

Last week the clothing retailer Eddie Bauer LLC issued a press release to announce that its point of sale (“POS”) system at retail stores was compromised by malware for more than six months earlier this year. The...more

Heal Thyself: Insider Threats to Heed, Especially for Industries with Large Amounts of Personal Information

A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more

Healthcare Records Held Hostage: When ransomware attacks

Imagine for a moment that your hospital or physician practice suddenly cannot access its electronic medical records. There hasn’t been a natural disaster. No, instead you are inexplicably staring at a computer screen from an...more

What the Shadow Brokers Affair Means For A Cyber Future

It could have been a Bond trailer, complete with the dramatic intro “In a world where there are no secrets….” But this is real. On Monday, a mysterious group calling itself the Shadow Brokers released files apparently swiped...more

FFIEC Provides Banks with Guidance Following the SWIFT Hacks

On June 7, 2016, the Federal Financial Institutions Examination Council (FFIEC) reminded banks of the cyber risks associated with interbank messaging and wholesale payment networks. FFIEC made its announcement after hackers...more

Employment Law Navigator – Week in Review: August 2016 #4

Last week, a federal judge dismissed a transgender discrimination lawsuit brought by the EEOC, citing the company owner’s religious beliefs and the Religious Freedom Restoration Act. The case involved the termination of a...more

3.3 Million Health Records Breached by Business Associate Newkirk

Newkirk Products Inc., which provides ID cards and management services for healthcare organizations, including multiple Blue Cross Blue Shield organizations, has announced that it has discovered that its computer system was...more

Ransomware and Malware Continue to Plague Health Care Organizations

We continue to warn health care organizations about the real and serious risks associated with ransomware and malware, but organizations don’t prepare for it adequately and are getting hit hard. Just this past week,...more

Brexit Board Briefing

The world is awash with uncertainty about Brexit. We imagine that you, like most, are sorting through it all. Pillsbury is here to help. Our dedicated Brexit Team is monitoring developments and weighing the legal risks and...more

Data Breach Plaintiffs Continue to Face Article III Standing Challenges

Standing remains a high hurdle for individuals whose personal information is compromised as a result of a data breach but who cannot establish that the stolen information was actually used improperly. Class action claims...more

Dude, Where’s My Bitcoin?

Somewhere in a lavish Mediterranean villa a drug lord wearing an off-white suit had a heart attack. Elsewhere a tech whiz in Silicon Valley refreshed his browser multiple times as his heart sank further with each reloaded...more

U.S. Business Groups Urge China to Revise “Onerous” Draft Cybersecurity Rules

On August 10, 2016, more than 40 international business associations spanning finance, information technology, insurance, and manufacturing urged the Chinese government to revise drafts of new cybersecurity regulations. Led...more

3,201 Results
|
View per page
Page: of 129
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×