News & Analysis as of

Internet of Things Cybersecurity

Three big questions about AI in financial services

by White & Case LLP on

To ride the rising wave of AI, financial services companies will have to navigate evolving standards, regulations and risk dynamics—particularly regarding data rights, algorithmic accountability and cybersecurity....more

A Federal Cyber Security Law Coming Your Way?

by Miles & Stockbridge P.C. on

On Thursday, June 29, 2017, Sens. Hatch and Markey introduced the “Promoting Good Cyber Hygiene Act” that would direct the National Institute of Standards and Technology (NIST) to establish a set of baseline voluntary best...more

New FTC Guidance on Children’s Online Privacy Protection Act

by Morgan Lewis on

In May 2017, Senator Mark Warner of Virginia sent a letter to the Federal Trade Commission (FTC) raising concerns about the security of data collected, transmitted, and/or stored by internet-connected products geared toward...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Intellectual Property and Technology News (Asia Pacific) June 2017

by DLA Piper on

Welcome to the latest Asia Pacific Edition of the Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in intellectual property and technology law, offering...more

FTC Submits Comments on IoT Security

by Morgan Lewis on

The Federal Trade Commission (FTC) submitted public comments to the US Department of Commerce’s National Telecommunications and Information Administration (NTIA) in connection with the NTIA’s draft guidance on improving the...more

Companies Using IoT Being Hit with Security Breaches

A new survey released by Altman Vilandrie & Company, which surveyed 400 IT personnel who have purchased Internet of Things (IoT) security products, shows that 46 percent of companies that buy IoT security admitted they have...more

IoT Cybersecurity and Data Privacy Trends in Asia: Be Ready

by Hogan Lovells on

In this hoganlovells.com interview, Hong Kong-based Hogan Lovells partner Mark Parsons talks about the regulatory environment in Asia as it relates to cybersecurity, data privacy, and the Internet of Things (IoT)....more

The Internet of Things: A Trifecta of Cyber and Physical Threat Risks

by Wilson Elser on

The recent WannaCry ransomware cyberattack provided another chilling reminder of the potential disruptive power behind the Internet of Things. Even before the WannaCry attack in May 2017, a distributed-denial-of-service...more

ENISA and Semiconductor Companies Seek Cybersecurity Standards from European Commission

by Morgan Lewis on

The European Union Agency for Network and Information Security (ENISA), along with three semiconductor companies, recently released a position paper proposing a position for the European Commission (EC) on security and...more

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

Smart Buildings - not all just bricks and mortar

by DLA Piper on

Imagine a day where any part of a building can report its own state of health, when a machine can tell you if its feeling unwell and 'needs a service', when you can track and prevent, before it happens, a water or gas leakage...more

NIST Releases Draft Cybersecurity Guidance for Wireless Infusion Pumps

The National Institute of Standards and Technology (NIST) announced this week that it has issued draft cybersecurity guidance for hospitals to consider when using infusion pumps, particularly since infusion pumps are no...more

In the Privacy of Your Home

By now, it’s pretty common knowledge that Alexa has been on a dollhouse shopping spree, and is also helping to solve a murder. Clearly, Alexa cannot be trusted and that’s why she has only limited trigger words, including...more

Babies and Baby-making, or Not… Privacy and Security Lessons for the Internet of Things

by BakerHostetler on

What do babies, sex toys and wireless head phones have in common? Apparently, the privacy concerns of the Federal Trade Commission (FTC), state AGs and legislatures, class action plaintiffs, and consumer advocacy groups, at...more

California Bill Mandates Privacy By Design For IoT Devices

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Privacy Tip #83 – “Alexa, Disconnect Yourself from the Internet Now!” BrickerBot Malware Attacking IoT

We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more

Banks’ Boards of Directors Face New Cybersecurity Challenges

by BakerHostetler on

Banks’ boards of directors must, among other things, understand the risks associated with existing and planned IT operations, monitor risk management, and work with senior bank managers on strategic technology planning. See...more

Privacy and the Internet of Medical Things: What’s a curmudgeon to do?

by Thompson Coburn LLP on

One of the authors of this piece uses a medical device that is wirelessly networked to the device’s vendor. The author recently received a text message from the vendor, sending “congratulations” for using the device for an...more

Crowdsourcing Cybersecurity in 2017

by BakerHostetler on

BakerHostetler began publishing its Data Security Incident Response Report in 2015. Although we were the first law firm to do so, inspiration for the report came from similar reports that cybersecurity firms issue. We will be...more

Homeland Security Committee Hearing Focuses On “Borderless Battle” Of Cyber Threats

by King & Spalding on

On March 22, 2017, the U.S. House Committee on Homeland Security heard testimony on the current state of the global cyber battleground, how rapid changes in technology and the expanding Internet-of-Things (“IoT”) present new...more

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

Your Cyber Minute: Lessons learned from the automotive sector

by Hogan Lovells on

The internet of things has presented new challenges across all industries. Hear partners Harriet Pearson and Tim Tobin discuss what others can learn from automotive in this sharing of best practices. ...more

Blog: Have an IoT Product? Follow Federal Labeling Requirements.

by Cooley LLP on

A device that connects wirelessly to the internet, such as a fitness tracker, smart coffee pot, or home security system, must comply with country-specific equipment authorization and labeling rules. In the US, IoT devices...more

181 Results
|
View per page
Page: of 8
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.