News & Analysis as of

Internet of Things Cybersecurity

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

Smart Buildings - not all just bricks and mortar

by DLA Piper on

Imagine a day where any part of a building can report its own state of health, when a machine can tell you if its feeling unwell and 'needs a service', when you can track and prevent, before it happens, a water or gas leakage...more

NIST Releases Draft Cybersecurity Guidance for Wireless Infusion Pumps

The National Institute of Standards and Technology (NIST) announced this week that it has issued draft cybersecurity guidance for hospitals to consider when using infusion pumps, particularly since infusion pumps are no...more

In the Privacy of Your Home

By now, it’s pretty common knowledge that Alexa has been on a dollhouse shopping spree, and is also helping to solve a murder. Clearly, Alexa cannot be trusted and that’s why she has only limited trigger words, including...more

Babies and Baby-making, or Not… Privacy and Security Lessons for the Internet of Things

by BakerHostetler on

What do babies, sex toys and wireless head phones have in common? Apparently, the privacy concerns of the Federal Trade Commission (FTC), state AGs and legislatures, class action plaintiffs, and consumer advocacy groups, at...more

California Bill Mandates Privacy By Design For IoT Devices

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Privacy Tip #83 – “Alexa, Disconnect Yourself from the Internet Now!” BrickerBot Malware Attacking IoT

We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more

Banks’ Boards of Directors Face New Cybersecurity Challenges

by BakerHostetler on

Banks’ boards of directors must, among other things, understand the risks associated with existing and planned IT operations, monitor risk management, and work with senior bank managers on strategic technology planning. See...more

Privacy and the Internet of Medical Things: What’s a curmudgeon to do?

by Thompson Coburn LLP on

One of the authors of this piece uses a medical device that is wirelessly networked to the device’s vendor. The author recently received a text message from the vendor, sending “congratulations” for using the device for an...more

Crowdsourcing Cybersecurity in 2017

by BakerHostetler on

BakerHostetler began publishing its Data Security Incident Response Report in 2015. Although we were the first law firm to do so, inspiration for the report came from similar reports that cybersecurity firms issue. We will be...more

Homeland Security Committee Hearing Focuses On “Borderless Battle” Of Cyber Threats

by King & Spalding on

On March 22, 2017, the U.S. House Committee on Homeland Security heard testimony on the current state of the global cyber battleground, how rapid changes in technology and the expanding Internet-of-Things (“IoT”) present new...more

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

Your Cyber Minute: Lessons learned from the automotive sector  [Video]

by Hogan Lovells on

The internet of things has presented new challenges across all industries. Hear partners Harriet Pearson and Tim Tobin discuss what others can learn from automotive in this sharing of best practices. ...more

Blog: Have an IoT Product? Follow Federal Labeling Requirements.

by Cooley LLP on

A device that connects wirelessly to the internet, such as a fitness tracker, smart coffee pot, or home security system, must comply with country-specific equipment authorization and labeling rules. In the US, IoT devices...more

Cyber Security and Social Engineering: A Big Low Tech Problem

by LeClairRyan on

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

Bitcoin and Blockchain Technology Update: Research Paper

by Locke Lord LLP on

Locke Lord London Global Head of Cards & Payments Robert Courtneidge and Associate Charlie Clarence-Smith wrote a research paper on bitcoin and blockchain technology. Over the past few years, digital currencies have been...more

Cybersecurity 2017: The Year in Preview

by Foley Hoag LLP on

Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more

NTIA Highlights Promise and Policy Challenges of IoT, Seeks Additional Comments

by Hogan Lovells on

On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more

[Event] Who's in the Driver's Seat? What the Connected Car Shows Us About the Legal and Regulatory Issues of the Internet of...

by BakerHostetler on

The Internet of Things (IoT) is creating unprecedented opportunities and challenges – launching groundbreaking collaboration among disparate industries and generating insightful data from uncommon sources....more

DHS Releases Strategic Principles for Security of the Internet of Things

by Locke Lord LLP on

On November 15, 2016 the U.S. Department of Homeland Security released its Strategic Principles for Security of the Internet of Things (IoT) (the “Strategic Principles”). DHS recognizes that rapid innovation in the IoT may...more

Your Cyber Minute: Top threats for 2017 [Video]

by Hogan Lovells on

Hogan Lovells Partner Harriet Pearson and Managing Principal of our Cyber Risk Services Jeff Lolley look ahead to 2017's major cyber vulnerabilities and where clients need to safeguard. ...more

"Privacy & Cybersecurity Update - January 2017"

In this edition of our Privacy & Cybersecurity Update, we discuss how the prospect of a new chair and three new commissioners at the FTC may impact the agency's approach to cybersecurity regulation, a new Massachusetts...more

Privacy and Data Security: 2017 Year in Preview

by Polsinelli on

Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more

Privacy & Cybersecurity Newsletter

by Locke Lord LLP on

New York’s Cybersecurity Requirements for DFS Licensees: A New Item at the Top of the To Do List - With a compliance date a few months away, licensees of the New York Department of Financial Services (DFS) must start...more

171 Results
|
View per page
Page: of 7
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!