Internet of Things Cybersecurity

News & Analysis as of

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Employment Law Navigator – Week in Review: May 2016 #3

Last week, news broke that Nicola Thorp, a UK temp worker assigned to PwC, was sent home for violating her temp agency’s dress code by failing to wear high heels. Portico, the agency, explained that the policy requiring...more

Internet of Things: FTC Settlement Again Emphasizes the Need to Protect Consumers

On February 23, the FTC announced that computer hardware maker ASUSTeK Computer, Inc. agreed to settle charges that it allegedly failed to protect consumers as required by federal law. The announcement of this settlement is...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

Alert: Coming Soon: Federal Regulation of the Internet of Things

The hands-off approach Washington has taken on regulating the Internet of Things ("IoT") may be about to change: the Department of Commerce, through its National Telecommunications and Information Administration ("NTIA"), has...more

It’s Not Just the Internet of Things Anymore

Last year, there were an estimated 16 billion devices connected to the Internet, and predictions say that the number will rise as high as 30 billion devices by 2020. The Internet of Things (IoT) has gained publicity (or...more

Cyber Attacks on Infrastructure are Increasing: Review Your Insurance As “Internet Of Things” Risks Grow and Change

In the December post Systemic Cyber Risks And The Internet of Things, we wrote about the increasing risk of cyber attacks on infrastructure and consumer products, and related insurance issues. We noted in that post that,...more

Cybersecurity: past is prologue

Cyberattacks on businesses and developments in cybersecurity law took prominent places on the world’s front pages in 2015. As 2016 unfolds, we are not seeing this trend abate. Cyberattacks will only continue to grow in scale...more

The Internet of Things: The Cyber Vulnerability Landscape Emerges

The phenomenal growth of the Internet of Things (IoT), widely hailed in 2015, has been greater than originally forecast. Gartner, Inc. estimates a 30 percent increase in IoT devices connected to the Internet in 2016, which...more

FDA Embraces Internet of Things: New Draft Guidance on Postmarket Cybersecurity for Medical Devices

The FDA’s recently issued draft guidance on “Postmarket Management of Cybersecurity in Medical Devices” seeks to address some of the increasing concerns that medical device providers, regulators, and consumers have about...more

Executive Action: Obama Administration Budgets for Cybersecurity

On February 9, 2016, the Obama administration released its final budget, which includes a request for $19 billion to fund the Cybersecurity National Action Plan (CNAP). The CNAP sets forth a variety of cybersecurity and...more

The Case of the Hacked Hospital: When a Cyber Breach Becomes a Health Crisis

Recently, we noted vulnerability issues from use of the Internet of Things and how that has come to impact the health industry. Recent events continue to highlight this development. Since the start of the year, there have...more

Managing the Cybersecurity Risks of the Medical Internet of Things

The cybersecurity ramifications of the Internet of Things (IoT) are perhaps nowhere more crucial—potentially a matter of life and death, in fact—than in the realm of medical devices. Until recent times, a potential hack of...more

Will Wearable Technology Be a Boost To Enterprise Security?

Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more

Top Trends to Watch for in 2016

Cybersecurity - Manufacturers continued to face challenges and find opportunities related to cybersecurity in 2015, and those trends can only be expected to intensify in 2016. New laws and new threats have either...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

NIST IoT Framework Raises Interesting Cybersecurity and Data Privacy Challenges

The National Institute of Standards and Technology (NIST) released the draft Framework for Cyber-Physical Systems, which is intended to provide an outline for the development and maintenance of secure, interoperable Internet...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Systemic Cyber Risks And The Internet of Things

Companies’ awareness of “cyber” risks has increased significantly because of large and highly publicized data security breaches, such as Target and Home Depot. Companies are starting to more proactively manage the risk of...more

ALM cyberSecure Primer: Investment Opportunities, Internet of Things, Cybersecurity ABCs, Stakeholders...

Must-read cybersecurity commentary and analysis from the event primer for ALM's upcoming cyberSecure conference, Dec 15 & 16th in New York City. In this issue: ABC's for the C-suite, cyber risk stakeholders and why they...more

"Intellectual Property and Technology News (Asia Pacific) - November 2015

Welcome to the latest Asia Pacific Edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in intellectual property and technology law, offering perspective,...more

Consumer Trust should be at the heart of the Digital Economy

A recent report summary produced by the Organisation for Economic Cooperation and Development (‘OECD’) highlighted that many countries are placing too much emphasis on developing their digital economies and are neglecting the...more

The Internet of Things and the Inevitable Collision with Product Liability PART 4: Government Oversight

The exponential growth of the Internet of Things (IoT) is far outpacing the ability of stakeholders to address safety standards and security concerns. This is not unusual as rapidly developing technology often challenges...more

Privacy, Security, Risk: What You Missed At IAPP Conference

Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more

88 Results
|
View per page
Page: of 4
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×