Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Illinois voter registration database hacked

The Illinois State Board of Elections has notified voters that its online voter registration site has been hacked. According to the letter sent to Illinois voters by the Board of Elections, “We have found no evidence...more

Is Ransomware a Notifiable Data Breach Event?

There is no doubt that companies face unprecedented volume and variation in both disruptive and intrusive cyberattacks on their networks. Among the different attack methodologies today, ransomware is quickly becoming a major...more

Privacy Tip #45 – Evaluate the data security of your dream car before you buy it: Tesla is on top for data security right now

We have previously reported on hackings of automobiles. Not only can hackings obtain information about your driving habits, your GPS usage and location, the use of your cell phone, access to your contacts, and other...more

Auto-ISAC announces automotive cybersecurity best practices

Members of the Automotive Information Sharing and Analysis Center (Auto-ISAC) recently released an overview of comprehensive Automotive Cybersecurity Best Practices developed as a proactive measure to further enhance vehicle...more

Cybersecurity News & Notes – July 2016 #4

In Case You Missed It: U.S. Major party platforms address cybersecurity. The two major parties have released their 2016 election platforms, both of which include cybersecurity planks. The Republican platform’s perspective...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

European Commission Publishes Communication on Cybersecurity

On 5 July, the European Commission (“EC”) published a communication outlining measures to improve resilience to cyber incidents, improve cooperation and information sharing, and promote innovation and competition in the...more

Practical Cybersecurity Guidance from TheCityUK and Marsh

TheCityUK and Marsh have jointly published a report urging UK financial and related professional services sectors to step up their efforts to address cyber risk. The report (headed “Cyber and the City”) suggests that...more

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

Cybersecurity Response to Recent Wholesale Payment Systems Breaches

In February 2016, hackers stole $81 million from the Bangladesh central bank by sending fraudulent messages through the Society for Worldwide Interbank Financial Telecommunication (SWIFT) messaging system. Three months...more

Hackers using cyber weapons to attack IT systems

A depressing new report by security firm LightCyber opines that hackers are using cyber weapons to evade detection when deploying attacks to IT systems rather than malware. In fact, the report says that cybercriminals are...more

Omni Hotels latest hotel chain hit with malware

Omni Hotels notified guests on Friday, July 8, 2016, that its point of sale systems were compromised with malware from December 23, 2015, through June 15, 2016....more

Federal Regulators Focus on Minimum Cyber Standards For Banks

A new set of federal banking regulations are on the horizon aimed at helping financial institutions put in place minimum compliance standards to prevent future cyber-attacks. Bloomberg Law has reported that the Federal...more

Home Depot Challenges Banks’ Standing to Recover Losses Related to Data Breaches

In the aftermath of major data breaches at deep-pocketed retailers and other businesses, there is typically no shortage of litigants who move quickly to seek compensation from the business at which the breach occurred. But...more

International Regulators Issue Cybersecurity Guidance to the Financial Industry

The Bank for International Settlement (BIS) Committee on Payments and Market Infrastructures (CPMI) and the International Organization of Securities Commissions (IOSCO) last week issued the first internationally agreed-upon...more

Cyber Attacks Reach Subrogation

It was just a matter of time. As cyber-attacks rose and the data security breaches became increasingly devastating to businesses and individuals, cyber breach insurance became more prevalent. And where insurance appears,...more

UK Financial Regulatory Developments - July 2016 #1

ISDA advocates unity for margin timetable - ISDA has considered the implementation schedule for a coordinated global margining framework for non-cleared derivatives. Under the agreed timetable, implementation is to be...more

SEC Cyber Update: Official Outlines Active Role for SEC on Cybersecurity as Enforcement Questions Persist

SEC Chicago Regional Director David Glockner spoke at a PLI Conference in New York on June 6 regarding the SEC’s data security regulations and enforcement efforts. Mr. Glockner acknowledged frustration with the Division of...more

Another One Bites the Dust: Maryland Federal District Court Dismisses Putative Data Breach Class Action for Lack of Standing

The United States District Court of Maryland recently dismissed a putative class action alleging that CareFirst’s failure to adequately secure the computer hardware storing their customers’ personal information led to two...more

Revisiting Cyber Insurance: Are You Covered?

Increasingly, companies are looking to insurance to help manage their cybersecurity risks and defray losses sustained from data breaches. Losses can range from reputational damage, business interruption, and professional...more

Your daily dose of financial news - The Brief – 6.29.16

Big financial firm stress test results are out from the Fed later today, and though all banks proved up to the task of reserving enough capital (as reported last Friday), the economic downturn simulation that’s part of round...more

Also In the News - Data, Privacy, & Security Practice Report - June 2016

Average Cost Of Data Breaches Estimated At $4 Million Worldwide, $7 Million In The U.S. - A new study published by IBM and the Ponemon Institute sets the average total cost of a data breach at $4 million. The study,...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

FFIEC Warns of Cyber Attacks

The Federal Financial Institutions Examination Council (FFIEC) reiterated the importance of banks protecting themselves from cyber attacks in a newly issued statement, urging financial institutions to "actively manage the...more

International Maritime Bureau warns of cyber attacks

Following the issuance of Plymouth University Maritime Cyber Threats Research Group study on the risk of cyber threats, the International Maritime Bureau (IMB) recently issued a warning to shipping and maritime companies to...more

643 Results
|
View per page
Page: of 26
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×