Data Protection Cybersecurity

News & Analysis as of

Heal Thyself: Insider Threats to Heed, Especially for Industries with Large Amounts of Personal Information

A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more

LastPass Security Vulnerabilities Discovered

Passwords have always been a challenge. It is hard to remember them, and you are not supposed to use the same password across different platforms. Several companies, including LastPass, have tried to help consumers with...more

New Presidential Policy Directive Hopes to Coordinate Federal Response in the Event of a Cyber Attack

In an implicit acknowledgment that the Federal government's response to cyberattacks is diffused among quite a number of agencies, the White House issued Presidential Policy Directive (PPD) 41 last week (July 26). The...more

DHS Provides Guidance on Cyber Incident Reporting

The United States Department of Homeland Security (hereafter "DHS") has released helpful guidelines and points of contact for reporting cyber incidents to the Federal Government. Expanding on a discussion initially started in...more

President Obama Issues Directive on Government Cyber Incident Response

Last week, President Obama issued a new Presidential Policy Directive (PPD) establishing principles to govern the federal government’s response to cyber incidents, “whether involving government or private sector entities.” ...more

Cybersecurity in life sciences: what is your duty of care?

Cybersecurity continues to be headline-grabbing news, particularly following recent reports of high-profile cyber attacks on a number of major well-known corporations. Conscious of their fiduciary duties, boardrooms of global...more

Health Update - July 2016

The Vulnerability of Healthcare Information - According to a report the Brookings Institute issued in May 2016, 23% of all data breaches occur in the healthcare industry. Nearly 90% of healthcare organizations had some...more

Is encryption the key to your data security?

With the increased rate of data breaches targeting personal information, an increased public awareness of online privacy, and an increasingly demanding regulatory landscape, large and small businesses are looking to...more

Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA

When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

Brexit: Baroness Neville-Rolfe on Data Implications

At the beginning of July, Baroness Neville-Rolfe gave a speech at the annual Privacy Laws & Business conference, outlining the government’s stance on the implications of Brexit for a range of data issues including the GDPR,...more

Changes afoot in China cyber and data laws

Significant developments have been announced by the Chinese Government in recent weeks in relation to cyber security, data handling and online activities. Organisations doing business in the People's Republic of China are...more

Data Breach Incident Response: 5 Questions to Ask and New Laws to Know Now

The spring legislative sessions this year brought a now-familiar round of revisions to data breach notification laws, with states broadening their laws in often divergent ways. This year, Illinois, Nebraska, and Tennessee...more

Gartner identifies future cyber security technologies to fight cyber crime

A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more

"Data Privacy Protection and Cybersecurity: A Business and Legal Primer"

The news regularly reports on data breaches and cybersecurity. While we read about the biggest breaches – Home Depot, Target, Anthem, JP Morgan, Wyndham – probably every business has been hacked and will be hacked again. ...more

White House Commission on Cybersecurity Seeks Input from Stakeholders on Future of Digital Landscape

Last week, the White House Commission on Enhancing National Cybersecurity held its third of six scheduled meetings around the nation. President Obama established the Commission by Executive Order in February 2016 with the...more

"Privacy & Cybersecurity Update - June 2016"

In this edition of our Privacy & Cybersecurity Update, we examine the impact of Brexit on EU data protection, court rulings on cyber insurance policy exclusions and coverage gaps, recent statements from the FTC and the...more

UK Data Privacy Laws in a Post-Brexit World

Following the United Kingdom’s nonbinding vote to leave the European Union (“Brexit”), what do businesses need to consider for data privacy compliance?...more

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

Raytheon/Ponemon survey confirms companies wait until an event to hire a data security vendor

The results of a Raytheon commissioned Ponemon study released on June 7, 2016 shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to...more

Will Privacy Enforcement Actions Impact “Reasonable” Security Measures Needed to Protect Trade Secrets?

In widely-publicized, contested privacy cases last year, the FTC advocated in favor of a high baseline for information security measures.  Among the security practices attacked by the FTC as critical mistakes by companies...more

Illinois Joins the Fray: Strengthens its Laws Around Data Breach Notification and Data Security

Sophisticated phishing scams and muscular hacking efforts continue to compromise personal and sensitive information held by insurers, hospital systems, and businesses large and small. In response, many states have...more

FedRAMP Accelerates the Process for Federal Contractors to Obtain Cloud Service Provider Authorizations and DoD Revises its Cloud...

Cloud computing is ubiquitous in the federal market place. Many federal contractors either provide cloud computing services to the government or use cloud computing services when performing a federal contract. For cloud...more

2016: The Year of Cyber Insurance?

It has been said that there are two types of companies in the world – those that have been hacked, and those that do not yet know they have been hacked. While perhaps an overstatement, it seems that every day, another company...more

1,138 Results
|
View per page
Page: of 46
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×