Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Data Breach Plaintiffs Bag a Win on Standing - Seventh Circuit Finds Against Neiman Marcus

In what is sure to be a widely cited data breach standing decision, the U.S. Court of Appeals for the Seventh Circuit found that increased risk of future harms from a data breach are sufficient to confer standing to sue upon...more

The Internet of Things and the Inevitable Collision with Products Liability PART 3: Initial Contact

This is the third in a series of blogs examining the rapid development of the Internet of Things (IoT) and its consequential impact on product liability risk. The development of the IoT has been so rapid and the applications...more

“Everything Old is New Again” – Issues in Recent Cyber Insurance Litigation

Early days still for coverage litigation about cyber risks – whether under cyber insurance policies or other types of policies. This is not surprising given the relatively short history of cyber risks and even shorter history...more

Ashley Madison Reveals Even More: Hacking May Be An Inside Job

In recent years, hacking has infiltrated the retail industry. Hacking has infiltrated the healthcare industry. Hacking has infiltrated the sports industry. And now, hacking has now infiltrated the most personal (some would...more

Cyber Risk Governance in the Digital Age

It has taken a while for companies to realize the value of digital assets, and it is also taking a while for companies to digest the significance of digital risks. In the digital economy, virtually all aspects of business...more

Higher Education Institutions Increasingly Falling Victim to Cyberattacks

Higher education institutions are treasure troves for hackers. Colleges and universities are huge repositories of research data, sensitive information for large populations of applicants and enrolled students (personal,...more

The Connected Car and Keeping YOU in the Driver’s Seat

Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more

Jeep Hack Drives Cyber, Crisis, Liability and Supply Chain Coverage Issues

A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines. The vulnerability of vital control systems to a remote hacking...more

FERC, NERC and Business Blackout: New CIP Standards and Fictional Cyber Attacks

The Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) July 16, 2015, proposing to approve various Critical Infrastructure Protection (CIP) reliability standards proposed by the North...more

Federal Data Breach Bill Stalled in Congress

A key distinguishing feature of U.S. data privacy laws is their patchwork nature. There are industry-specific data privacy laws at the federal level (think HIPAA or the GLBA), yet there are no comprehensive federal standards...more

Treasury Deputy Secretary Raskin Delivers Remarks on Cybersecurity in the Financial Sector

On July 14, Deputy Secretary of the Treasury Sarah Bloom Raskin delivered remarks at the American Bankers Association Summer Leadership meeting in Baltimore. Speaking on cybersecurity and cyber-resiliency in banking and the...more

The SEC's Investment Management Division Has Some Things to Tell You about Cybersecurity

Lots of agencies and organizations want to boss you around about cybersecurity. In April, the SEC and the Justice Department published more directions on the issue. We’ll cover the very brief guidance issued by the SEC’s...more

Brokers Beware: Will the SEC Extend New Cyber Guidance to Brokers and Investment Advisers?

Against the backdrop of a steady stream of cyber-attacks and data breaches, Securities and Exchange Commissioner Luis A. Aguilar recently spoke about his hope to expand upcoming SEC cyber security guidance, known as...more

That is SO last week - July 2015 #4

Last week, the Equality Act was introduced in Congress. If enacted, this historic legislation will prohibit discrimination in employment and other life activities on the basis of sexual orientation and gender identity. It’s...more

Russian Government Considering Delaying Data Localization Law

A controversial data localization law in Russia that would require businesses to perform data storage and processing with servers located on Russian soil is set to go into effect on September 1, 2015, after an amendment...more

The SEC’s Investment Management Division Has Some Things to Tell You about Cybersecurity

Lots of agencies and organizations want to boss you around about cybersecurity. In April, the SEC and the Justice Department published more directions on the issue. We’ll cover the very brief guidance issued by the SEC’s...more

Connecticut Legislation Establishes Strategic Partnerships in Cybersecurity

On July 10, 2015, Governor Malloy signed into law Special Act No. 15-21 – An Act Establishing Strategic Partnerships in Cybersecurity. The Connecticut legislation directs the Department of Labor, in conjunction with the...more

Government Contracts Quarterly Update - July 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. Please see...more

DOJ Cracks Down on Cyber Criminals

The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Auto manufacturers’ alliance create information sharing and analysis center for cyber-threats

Twelve automakers that make up the Alliance of Automobile Manufacturers (AAM) have agreed to form an information sharing and analysis center (Auto ISAC) that will facilitate the sharing of cyber security data to stay abreast...more

Seventh Circuit overturns Neiman Marcus data breach class action dismissal

In an unusual turn for recent data breach class action cases, the Seventh Circuit this week found that a likely threat of identity theft is sufficient for a proposed class to have standing to sue Nieman Marcus for a...more

[Event] The Aerospace & Defense Forum: SPAWAR: The Navy's Information Dominance Systems Command- July 28, 5:30pm - San Diego, CA

Guest Presenter: Mr. Patrick M. Sullivan, Executive Director, Space and Naval Warfare Systems Command - What areas are most important and likely to be funded in the near term? - How does SPAWAR view sequestration...more

Cybersecurity is once again a hot topic as Illinois undergoes PIPA update

Cybersecurity is a hot topic at both the state and federal level. Specifically, Illinois is in the process of amending its Personal Information Protection Act (“PIPA”). Illinois SB 1833 will amend PIPA by establishing more...more

1,973 Results
|
View per page
Page: of 79

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×