Cybersecurity Hackers

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Managing the Cybersecurity Risks of the Medical Internet of Things

The cybersecurity ramifications of the Internet of Things (IoT) are perhaps nowhere more crucial—potentially a matter of life and death, in fact—than in the realm of medical devices. Until recent times, a potential hack of...more

Tearing Down the Silos

AML and cybersecurity teams must discover what they have in common, identify mutual strengths and weaknesses, and move toward an effective fusion of functions, processes, and mindsets. ...more

Will Wearable Technology Be a Boost To Enterprise Security?

Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

The Rise of Driverless Cars

Automotive industry experts claim that we will be sharing the road with totally autonomous cars within the next five years. The benefits of driverless cars are obvious. People on average spend about two hours per day in a car...more

Chris Correa Isn’t Billy Beane and This Isn’t Moneyball

The lights going on and off within the head of former St. Louis Cardinals scouting director Chris Correa were once probably flickering more actively than the lights inside of The Staples Center just before the Los Angeles...more

“We’ve Been Hacked!”—New Developments in Cyber-Security Litigation

February’s Business Litigation Report advised clients that they could prepare for potential data breaches by conducting readiness audits and preparing cyber incident response plans. (See Traversing the Breach, February 2015.)...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Human Error Called The Most Common Factor In Data Breaches

As reported in the December 9, 2015 Wall Street Journal Law Blog, a recent report by the Association of Corporate Counsel (“ACC”) revealed that the most common reason for a data breach at companies is “employee error.” ...more

JD Wetherspoon announces over 650,000 customers’ data lost in hacking

JD Wetherspoon, a popular chain of pubs in the UK, notified its customers late last week that it has discovered that its website was hacked between June 15 and 17, which exposed the names, birth dated, telephone numbers,...more

Big Win for Automakers After Federal Judge Dismisses Car Hacking Lawsuit

On November 25, a California federal court dismissed without prejudice a proposed class action against Toyota Motor Corp., Ford Motor Co., and General Motors LLC, claiming the carmakers failed to ensure the electronic...more

ALM cyberSecure Primer: Investment Opportunities, Internet of Things, Cybersecurity ABCs, Stakeholders...

Must-read cybersecurity commentary and analysis from the event primer for ALM's upcoming cyberSecure conference, Dec 15 & 16th in New York City. In this issue: ABC's for the C-suite, cyber risk stakeholders and why they...more

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

Massachusetts develops a remote controlled contraceptive chip

Ladies and gentlemen, introducing the remote controlled contraceptive computer chip. Releasing measured doses of the levonorgestrel hormone, these computer chips can be implanted under a woman’s skin as a new form of birth...more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

Mental health center hacked

Not-for-profit mental health center Emergence Health Network, located in El Paso, Texas, has announced that its computer servers were compromised “through an unauthorized internet connection” from as far back as 2012....more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

ISIS Cyber-attacks On U.S. Infrastructure

At GridSecCon last week, FBI cyber division chief John Riggi announced that the Islamic State of Iraq and Syria (“ISIS”) attempted to hack American power companies, but failed. Riggi acknowledges the growing concern of...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

More Data Vulnerabilities, Cyber Breaches Detected in Healthcare Exchanges

Government audits continue to reveal that millions of people’s personally identifiable information is at risk. Continuous audit reports by the Office of the Inspector General (OIG) of The Department of Health and Human...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

353 Results
|
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×