Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Cybersecurity & Nonprofits: A Matter of Time?

The ever increasing cyber-attacks and data breaches targeting the private sector and government agencies, and the increased focus on cybersecurity plans and preparedness, may seem like remote risks for nonprofit...more

Cybersecurity and Data Privacy: Potential New Cybersecurity Regulations for Financial Institutions and Insurance Companies (11/15)

On the heels of recent high profile cyber-attacks against financial institutions and insurance companies, the New York State Department of Financial Services released a letter on November 9, 2015 that outlines proposed...more

Which Way is the “Wyndham” Blowing? Cyber Regulation After FTC vs. Wyndham

Does the Third Circuit’s recent decision in FTC v. Wyndham Worldwide Corp. usher in a new era of enforcement by the FTC and other federal agencies regarding cybersecurity practices? Regardless of the answer, it is important...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

U.S. Senate Moves Forward On Cybersecurity Information-Sharing Legislation

On October 27, 2015, the U.S. Senate passed the Cybersecurity Information Sharing Act of 2015 ("CISA") by a vote of 74-21. CISA had been stalled in the Senate since its submission in April 2015 by Senators Diane Feinstein...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

ISIS Cyber-attacks On U.S. Infrastructure

At GridSecCon last week, FBI cyber division chief John Riggi announced that the Islamic State of Iraq and Syria (“ISIS”) attempted to hack American power companies, but failed. Riggi acknowledges the growing concern of...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

Plan Now to Use Off-Band Communications During an Incident Response: Key Points

Your company is in crisis mode in the throes of a security incident response (IR). But you are calmly executing your well-honed IR plan - a plan you developed and tested during mock exercises over the past year. You are...more

SIFMA Urges Senate to Pass Cyber Sharing Bill

It seems as if every day there is a new report of a data breach or cyber attack. For the same reason that Willie Sutton robbed banks — “because that’s where the money is” — cyber criminals have been incessant in their...more

Cybersecurity at Small and Midsize Businesses

Cyberattacks against the country’s largest companies tend to garner the most press coverage and generate the most cybersecurity anxiety. For example, such high profile companies as eBay, JP Morgan, Home Depot and Target are...more

Cyber-Risks 2015 – A Board Primer

Cyber-risk is a witch’s brew of reputational, operational, legal and financial dangers. This toxic combination exposes a financial institution to a potentially existential hazard when an intrusion occurs. The only way to...more

More Data Vulnerabilities, Cyber Breaches Detected in Healthcare Exchanges

Government audits continue to reveal that millions of people’s personally identifiable information is at risk. Continuous audit reports by the Office of the Inspector General (OIG) of The Department of Health and Human...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

Six Steps Banks Should Implement to Ensure Their Security Procedures are Commercially Reasonable

Banks are tasked by the Uniform Commercial Code (the UCC) with using “commercially reasonable” security procedures when processing funds transfers. This responsibility is constantly evolving as bank fraud becomes more...more

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

Keeping the Data-Breach Headlines In Perspective

From the Sony Pictures settlement, to the Ashley Madison debacle, data breaches are making big headlines of late. And when it comes to one case in particular — the data breach at luxury retailer Neiman Marcus (Remijas v....more

Illinois to Host Cyber Risk and Security Conferences; CSBS to Co-host

On October 14, the Illinois Division of Banking announced that it would host two Cyber Risk and Security Conferences on November 9 and November 16. With the growing number of threats to financial data systems, cyber and data...more

556 Results
View per page
Page: of 23

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.