Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Data privacy, security and breach notification bill passes through House subcommittee

A closely watched bipartisan national data privacy, security, and breach notification bill cleared a House subcommittee yesterday, sending it to the full House Energy and Commerce Committee for review. There have been many...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

Cyber Vulnerability in Wind Turbines

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to a software bug, an attacker can get the user name and password from the browser. This can allow admin...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Good News for Companies: Pennsylvania District Court Rules That Plaintiffs Lack Standing without Actual or Imminent Misuse of Data

“There are only two types of companies left in the United States … those that have been hacked and those that don’t know they’ve been hacked.” That is how U.S. District Judge John E. Jones III of the Middle District of...more

District Court Dismisses Data Breach Case for Lack of Standing

The US District Court for the Middle District of Pennsylvania recently dismissed a consolidated class action against Paytime, Inc. arising out of a data breach by hackers who accessed the personal and financial information of...more

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more

Cyber Law Tracker: Protecting Cyber Networks Act Introduced by House Intelligence Committee

On March 24, 2015, members of the House Permanent Select Committee on Intelligence, including Connecticut Congressman Jim Himes, the Ranking Member of the Cybersecurity Subcommittee, issued statements commenting on the...more

FISMA II: A New Cyber World Framework to Strengthen Agency Information Security

As part of the Obama administration’s legislative efforts to safeguard government agency information, the Federal Information Security Modernization Act of 2014 (FISMA II) was recently enacted to fortify and update its 2002...more

The $10 Million Target Settlement

In the past two years, there have been a number of lawsuits filed against major corporations as a result of data breaches, including the class action filed against Target following the data breach it suffered in late 2013. ...more

EUROPE: EU-US data flows at risk? European Court of Justice today heard Facebook case.

Yesterday, the Schrems v. Irish Data Protection Commission case was brought before the Court of Justice of the European Union (‘CJEU’) for an oral hearing, following referral by the Irish High Court. While the final ruling by...more

Alert: Cybersecurity Risk Management for Communications Companies

An industry-led committee advising the Federal Communications Commission ("FCC") on cybersecurity released its final report on best risk management practices tailored to each of five main industry segments—broadcasting,...more

Cyberspy thriller with an unclear ending

It reads more like a spy thriller than a news story. Employees of the U.S. subsidiary of a global technology and media company log on to their computers one Monday morning and are greeted with the menacing figure of a neon...more

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

FFIEC Provides Overview of Cybersecurity Priorities

On March 17, the FFIEC released a summary of its cybersecurity priorities for the remainder of 2015. The FFIEC intends to enhance its cybersecurity preparedness in seven main ways: (i) issuing a cybersecurity self-assessment...more

FINRA Issues Report on Cybersecurity Practices

Following up on our post from last week on the SEC’s cybersecurity exam sweep, you should also know about FINRA’s recent report on this area. Last month, FINRA published a Report on Cybersecurity Practices that really could...more

FCC Communications Security, Reliability, and Interoperability Council Working Group Issues Final Report on Cybersecurity Best...

A Federal Communications Commission (FCC) working group, Cybersecurity Risk Management and Best Practices Working Group 4 (WG4), of the Communications, Security, Reliability, and Interoperability Council (CSRIC) advisory...more

When is Data Security “Unfair”?

Data security is big news. And so is the Federal Trade Commission (“FTC”). Put the two together in a crucible of litigation, and it is sure to be a blockbuster. That is what the closely-watched case FTC v. Wyndham, now...more

Large Retailer Agrees to Pay $10 Million Related to Data Breach Incident

On March 19, a district court granted preliminary approval in which a large retailer agreed to pay $10 million to settle a class-action action suit related to a 2013 data breach, which resulted in the compromise of at least...more

Corporate & Financial Weekly Digest - Volume X, Issue 11

In This Issue: - Delaware Proposal Banning Fee-Shifting and Permitting Exclusive Forum Provisions - SEC Charges Insiders for Failure to Update Schedule 13D Disclosures - CBOE Proposes Amendments to...more

California Eyes Groundbreaking Privacy and Cybersecurity Legislation

In California, home to Silicon Valley, Biotech Beach, drones and some of the nation’s strongest laws protecting personal and consumer privacy, legislators are grappling with how to balance popular innovations in technology...more

OCR’s Enforcement of HIPAA’s Privacy and Security Rules Continues with Robust 2014

With the news of the recent cyber-attack and resulting data breach at health insurance giant Anthem Inc., the buzz around data security and privacy is again high. The Anthem breach serves as a reminder to those entities...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

1,618 Results
|
View per page
Page: of 65