Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Why The Election Can’t Be Hacked: Internet Of Things Edition.

In our consulting days, a former boss – a retired Army Colonel – enjoyed sharing his Cold War recommendation for protecting sensitive documents from the KGB: fill up a fleet of tractor-trailers with every U.S. government...more

DOT Issues Proposed Cybersecurity Guidance for Auto Industry

On Monday, October 24, 2016, the Department of Transportation’s National Highway Traffic Safety Administration (NHTSA) issued proposed cybersecurity guidance to the auto industry, including auto manufacturers and designers...more

Latest Cyber Attack a Wake-up Call: What are your company’s IoT exposures?

The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more

G-7 Leaders Establish Cybersecurity Best Practices for Financial Sector

Businesses and financial entities continue to grapple with the increasing frequency and sophistication of hacking, displayed by the recent botnet attack that affected numerous websites on October 21, 2016, as well as the...more

European Court Of Justice Rules That Dynamic IP Addresses Can Be Personal Data

In a ruling with significant potential impact, the Court of Justice of the European Union (CJEU) has ruled that a dynamic internet protocol (IP) address may constitute "personal data" under EU Data Protection Directive...more

FFIEC Releases Answers To FAQs About Cybersecurity Assessment Tool

On October 17, 2016, the Federal Financial Institutions Examination Council (“FFIEC” or the “Council”) released a set of answers to frequently asked questions about its cybersecurity assessment tool (the “CAT”). The FFIEC, an...more

DoD Finalizes Cybersecurity and Cloud Computing Rule

On October 21, 2016, the Department of Defense (DoD) issued a final rule following-up on the interim rules it had issued on August 26 and December 30, 2015, regarding safeguarding contractor networks and purchasing cloud...more

When Botnets Attack: How Hackers Shut Down the Internet

Beginning early on October 21, 2016, Dyn, a New Hampshire based internet service company, was the victim of three distributed denial of service (DDoS) attacks. The first attack began at 7am ET and was resolved within about...more

DoD issues final rule on covered defense information clarifying contractor obligations

The US Department of Defense (DoD) issued a rule on Friday, October 21, 2016, finalizing its information security and cyber incident reporting requirements. The rule, Network Penetration Reporting and Contracting for Cloud...more

Connecticut Governor appoints State Cybersecurity Czar

Gov. Dannel P. Malloy recently appointed Democrat Arthur H. House the state’s first cybersecurity czar. House moves into the role after serving as the chairman of the Public Utilities Regulatory Authority for the past four...more

Cyber Security and Loss Recovery - A New Alternative for Organizations

The largest data breaches ever have occurred since 2015, and targets have encompassed a wide spectrum of entities. Organizations affected range from U.S. DOJ and the IRS—where citizens’ personally identifying information was...more

Federal Banking Agencies Propose New Requirements for Managing Cyber Risk

Three federal banking agencies have announced plans to develop new rules that would establish cyber risk management and resiliency standards for large interconnected entities under the agencies' supervision, as well as those...more

Bank Regulators Issue Notice of Proposed Rulemaking on Enhanced Cyber Risk Management Standards

Three federal banking regulatory agencies have approved an advance notice of proposed rulemaking (ANPR) inviting comment on a set of potential enhanced cybersecurity risk-management and resilience standards that would apply...more

Prepare for the Hack: Five Things to Keep in Mind when Shopping for Cybersecurity Insurance

When your company's confidential information ends up on the dark web, it is obviously too late to start thinking about adequate insurance coverage for the barrage of claims and expenses that are about to hit like a tidal...more

World Energy Council Issues New Report on Cyber Risk

Because cyber risk presents a “unique concern” in the energy sector, the World Energy Council has issued a new report entitled “The Road to Resilience: Managing Cyber risks,” to its industry leaders....more

Privacy Tip #56 – Be Careful Before You Link Your Home Appliance to Your Smartphone and Change Your Passwords Now

Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more

How to combat the risks of impersonation emails, imitative domains

Amid the headlines and legitimate concern about massive data breaches, we too often overlook the danger of targeted fraudulent emails, and imitative domain names and websites....more

Federal Reserve Board’s OIG Issues Reports Highlighting The Importance of Cybersecurity

In two reports issued on September 29, 2016, the Federal Reserve’s Office of Inspector General (“OIG”) discussed major management challenges facing the Federal Reserve Board (the “Board”) and the Consumer Financial Protection...more

SEC Proposes New BCP Rule and Issues Guidance

On June 28, 2016, the Securities and Exchange Commission (the “SEC”) released a proposed rule (the “Proposed Rule”) that would require registered investment advisers (“RIAs”) to adopt written business continuity and...more

Business Litigation Report - September 2016

Second Circuit Rejects Massive Class Action Settlement and Affirms Importance of Adequate Representation and Due Process Rights for Absent Class Members - The Second Circuit Court of Appeals recently considered whether...more

Avoiding common law firm cybersecurity pitfalls

Cybersecurity often causes trepidation among attorneys simply because attorneys lack understanding of the nature of online risks and how to protect themselves. As evidenced in Part One of this series, law firms appear to be...more

Who’s to Blame When No One is Manning the Ship?

Like it or not, technology is creeping into virtually every aspect of our daily lives. In fact, some people are so psychologically attached to their smartphones, that cellphone addiction has been given a clinical name,...more

When smart goes bad: Why internet security does not just refer to computers

A growing trend in the consumer electronics industry is the use of so-called “smart” devices — electronics that use wi-fi connections to allow them to be controlled remotely over the internet. From smart thermostats that can...more

Looking Ahead: Where Automotive Innovation Meets Cybersecurity in 2017

The automotive industry has long been exempt from the cyber attacks that have affected so many companies operating in the financial services, healthcare and retail spaces. However, that is changing quickly due to the copious...more

Cybersecurity Awareness Month: Visits From the Ghosts of Claims Past and Claims Future

Cybersecurity awareness month is nigh upon us again, and thus perspective is in order. 2016 brought us the first collection and analysis of the nascent claims history of the burgeoning cyber-insurance market. On August 27,...more

721 Results
View per page
Page: of 29
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.