News & Analysis as of

Hackers Data Protection

Plaintiffs’ Lawyer Predicts $1 Billion Settlement in Data Breach Case – But Where’s the “Harm”?

by Orrick - Trust Anchor on

This week, a high profile plaintiffs’ firm (Edelson) stated that “if done right,” the data breach class actions against Equifax should yield more than $1 billion in cash going directly to more than 143 million consumers...more

Corporate E-Note - September 2017

by Burr & Forman on

Global companies must safeguard confidential, proprietary information and trade secrets—not just from cybercriminals, “hacktivists,” cyberterrorists, and competitors—but from former employees. Too often, terminated or...more

The CFAA: Shield or Anti-Competitive Sword in the World of Data Scraping?

by Fish & Richardson on

Most people think of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, as the federal criminal statute addressing computer hacking and other cybercrime. But as more and more businesses vest their enterprise value in...more

Memo to Congress: Five Key Questions for Upcoming Equifax Hearings

Richard F. Smith – who presided over Equifax Inc. as CEO during one of the largest data breaches in a generation – will testify before two congressional committees this week....more

Consortiq Software System Demonstrates Security For UAS Is Possible

Unmanned aerial systems (UAS or drone) security has become a hot topic not only in the United States, but throughout countries around the world as more UAS hit the skies, increasing the potential for hackers to intercept data...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Cyberattacks—Are You Ready?

by McGuireWoods LLP on

Recent cyber-attacks hurt individuals and investors on a regular basis. Recent attacks have cost hundreds of millions of dollars. Firms that have dismissed the dangers are increasingly at risk of regulatory action. New...more

Protecting Your Identity After a Data Breach

by Jones Day on

In light of recent high-profile breaches of highly sensitive data, this is a good time to remind individuals of how to protect their identity and credit information....more

Privacy Tip #105 – Data Breach Woes

I spend a lot of time and effort to protect the privacy of my personal information. I am very careful. I have pretty good security hygiene. But I don’t have total control of my personal information and it is frustrating. I am...more

Not So Entertaining: Cybercrime In The Entertainment Industry

by Jackson Lewis P.C. on

Although certain industries are known targets for cyber attacks – healthcare, financial, government – cyber attacks pose a threat to all sectors. Organizations in the entertainment industry have increasingly become targets of...more

Health Care Companies Find Direction to Combat Cybersecurity Threats

by Burr & Forman on

More than 27 million patient records were affected by health care data breaches in 2016, according to a health care cybersecurity company. The cost associated with these breaches is staggering: an estimated $355 per stolen...more

D.C. Circuit Moves Data Breach Suit Forward

The U.S. Court of Appeals, D.C. Circuit issued a decidedly pro-consumer opinion recently in addressing what is required to establish standing for a data breach class action....more

Worth Another Look: Fending Off Cyberattacks

In January of 2017, the National Conference of State Legislatures (NCSL) published a list of the top 10 issues that will be before state legislatures across the nation this year. While we’re just over a quarter of the way...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

Wednesday’s ILTACON 2017 Sessions: eDiscovery Trends

by CloudNine on

As noted Monday and yesterday, the International Legal Technology Association (ILTA) annual educational conference of 2017 (otherwise known as ILTACON) is happening this week and eDiscovery Daily will be reporting this week...more

Cyber Insurance Primer

by Butler Snow LLP on

The number of reported U.S. data breaches tracked through June 30, 2017 hit a half-year record high of 791. This represents a significant jump of 29% over 2016 figures during the same time period. At this pace, it is...more

Hackers Target U.S. Power Plants, Including Kansas Nuclear Facility

by King & Spalding on

According to a June 2017 joint report issued by the Department of Homeland Security (“DHS”) and the Federal Bureau of Investigation (“FBI”), hackers penetrated the computer networks of at least a dozen U.S. power plants...more

How the U.S. Healthcare Sector Can Prepare for and Harden Its Systems Against Cyberattack

by Hogan Lovells on

“The number one issue on the minds of many CEOs and boards is cyberattacks and data breaches,” said Hogan Lovells partner Marcy Wilder. In this hoganlovells.com interview, Wilder discusses three key things health sector...more

Hackers Could Target Airports, Planes, Satellites, Ships, Cars, and Trains

Cybersecurity for critical infrastructure continues to be of concern, including the transportation sector. A new study by ABI Research concludes that although the transportation sector continues to increase spending on...more

Senate Introduces the Internet of Things (IoT) Cybersecurity Improvement Act of 2017 for Government-Acquired IoT Devices

by Balch & Bingham LLP on

On August 1, 2017, the Senate introduced the “Internet of Things (IoT) Cybersecurity Improvement Act of 2017”, which aims to bolster the security of government-acquired IoT devices. Sponsored by Sens. Mark Warner (D-VA),...more

Senate Bill Tackles Threat From Poorly Secured IoT Devices

by Fox Rothschild LLP on

A bipartisan group of Senators wants to make it more difficult for hackers to enlist smart thermostats, wireless security cameras and other connected devices in future cyberattacks. ZDNet reports that Sens. Mark Warner...more

If You SEC Something, Say Something

Just about every survey of General Counsels reveals the same #1 culprit of sleepless nights….. a cybersecurity hack. If you run a business in today’s global environment, it is hard to escape the fundamental reality that it is...more

Follow the Money and Beware the Extra “L”: First Department Sustains Claims against Fund Administrator After Hackers Grab Millions

A legal feud is underway between the world’s biggest hedge fund administrator and a former client over an email scam that resulted in hackers stealing millions in client funds. And not surprisingly, the time-honored...more

General Data Protection Regulation

by Revision Legal on

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it...more

Unusual IoT Hacking Shows Creativity of Hackers

Everything connected to the Internet is hackable and at risk. But there are some things connected to the Internet that you just don’t think of as risks to an organization. That is, until now. Darktrace has issued its report...more

384 Results
|
View per page
Page: of 16
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.