Federal Bureau of Investigation Cybersecurity

News & Analysis as of

White Collar Enforcement and the New Trump Administration: Your Top Ten Questions Answered

Enforcement activity under the Obama administration often made headlines for the eye-popping level of fines, with the Foreign Corrupt Practices Act (FCPA), Anti-Money Laundering (AML) regulations, and economic sanctions...more

Blame Hollywood: A Conversation with Stewart Baker, former General Counsel of the National Security Agency

Editor's Note: In the world of cyber law, privacy and cybersecurity, one of the largest and most colorful figures is Stewart Baker, whose resume includes a stint as General Counsel at the National Security Agency and...more

What Did They Say About Cybersecurity in 2016? 8 Proclamations from Regulators and the Courts

There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more

Obama Uses Executive Order Authority to Respond to Malicious Russian Cyber Activity - President Amends EO 13964 From April 2015 in...

President Barack Obama amended Executive Order (EO) 13964 on December 29, 2016, in response to intelligence community findings that the Russian government engaged in malicious cyber activity with respect to the U.S. electoral...more

Your Daily Dose of Financial News

By volume, December wasn’t an incredible month for US jobs. But the report did help cap a year that saw average hourly earnings rise 2.9%—the best since 2009 and a “turning point for the overall economy,” according to one...more

United States Imposes Cybersecurity Sanctions on Russia

Key Points - - This action marks the first time sanctions have been imposed under the Cybersecurity Sanctions Program established on April 1, 2015, with the designation of nine entities and individuals. -...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

White Collar Crime Law Enforcement in a Trump Justice Department - 8 Predictions

After a conventional presidential campaign, determining the policy priorities and direction of the incoming administration with respect to the Justice Department’s white collar law enforcement responsibilities can be a...more

Internet of Things (IoT) Security Takes Center Stage At FBI, DHS, NIST and Congress

On October 21, 2016, a domain name service host and internet management company experienced at least two waves of a distributed denial of service (DDoS) attack that impacted at least 80 websites, including those belonging to...more

A Closer Look: Practical Tips to Managing a Ransomware Attack Part 2

Part 1 of this two part series laid out the state of the industry regarding ransomware. In Part 2, this post will examine what steps to take, or not to take, during and after a ransomware attack. “We’ve Been Hit – Now...more

Cyber Security Awareness Needs To Last Beyond October

The U.S. Department of Homeland Security (DHS) has designed October as National Cyber Security Awareness Month. But as we leave October, remember that data security is an ongoing challenge that requires continued vigilance...more

A New Chapter in the Cybersecurity? Is there a Role for Active Deterrence?

In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more

Back to School – Avoiding Theft of Data and Money via the “Business Email Compromise” Scam

The FBI warned this summer that the “Business Email Compromise” (“BEC”) scam continues to grow, evolve, and target businesses of all sizes. As reported by the FBI in June, the scam had hit more than 22,000 victims for a...more

White House Releases Policy Directive On Cyber Incident Coordination

On July 26, 2016, the White House approved a Presidential Policy Directive (“PPD”) on coordinating responses to cyber incidents that occur in the United States. The PPD seeks to clarify who in the federal government is...more

Cybersecurity and Data Privacy: FBI Issues Public Service Announcement About Recent E-Mail Scam Targeting Businesses (6/16)

On June 14, 2016, the Federal Bureau of Investigation (FBI) issued a public service announcement relating to a recent surge in ‘business e-mail compromise’ (BEC) scams, which are sophisticated scams that target businesses...more

Kansas Heart Hospital pays ransom but attackers renege on their word

In a rare and twisted result, Kansas Heart Hospital was hit with a ransomware attack on May 18th, and made the decision to pay a “small amount” to the attackers in order to get its data back. Kansas Heart stated that no...more

Beware of Emerging Cyber Scams – Part 1: Business Email Compromise

This is the first in a series of articles about increasingly sophisticated cyber scams, and follows several alerts issued by the FBI’s Internet Crime Complaint Center (IC3). These scams include: (1) Business Email...more

New FBI Ransomware Alert: Bureau Provides Key Guidance for Prevention and Business Continuity Planning

The Cyber Division of the Federal Bureau of Investigation (FBI) recently issued a new ransomware notice. The notice encourages organizations, regardless of industry and size, to focus on two areas in their efforts to minimize...more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

FBI issues another warning of a “dramatic increase” in phishing spoofs of CEOs

We have consistently reported about increased phishing attacks through emails that purport to come from high level executives, including CEOs. According to the FBI, the hackers use sophisticated social engineering to spoof...more

Fiduciary Regulation and How Recent Cybersecurity Government Publications Impact HIPAA Security Compliance and the New Audit...

Fiduciary Regulation - The Office of Management and Budget released the final Fiduciary or Conflict of Interest regulation and related prohibited transaction exemption modifications from its review today. The next...more

FBI issues warning to law firms

The FBI has issued a Private Industry Notification to law firms indicating that a cyber crime insider trading ring is targeting “international law firm information used to facilitate business ventures.” According to the FBI...more

FBI and Traffic Safety Administration issue warning about car hackings

On March 21, 2016, the FBI and the U.S. National Highway Traffic Safety Administration issued a public safety announcement outlining the dangers of cars getting hacked. The announcement follows the media reporting about...more

[Webinar] Protecting Against Wire Transfer Fraud: Limiting Your Company's Exposure - Feb. 25th, 1:00pm CST

Beyond the headlines, the latest cyberattacks target corporate bank accounts, rather than consumer credit cards. The FBI has been warning that wire transfer fraud is booming. The billion-dollar problem targets businesses --...more

59 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×