News & Analysis as of

Network Security

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices

by CloudNine on

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

PRC’s New Cybersecurity Law to be implemented on June 1, 2017

by Dechert LLP on

Potential Implications for Foreign Network Products and Services - Cybersecurity is of national strategic importance to China, which has the largest group of internet users and the largest internet market in the world....more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Qakbot: Insight into a Persistent, Polymorphic Malware from the Cyber Defense Team at K2 Intelligence

Qakbot (Qbot) first emerged in 2009 as a piece of malware designed to steal online banking credentials from infected computers. It used classic key-logger technology combined with an ability to steal active session...more

California Bill Mandates Privacy By Design For IoT Devices

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

FTC Files to Protect Consumers’ Security in the Internet of Things

As more consumer devices connect to the Internet, regulators take a more aggressive stance requiring security promises be met. On January 5, 2017, the FTC filed a complaint against computer networking equipment...more

FTC sues IoT Device Manufacturer D-Link for Lax Cyber Security Practices

by Snell & Wilmer on

On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more

Home Depot Data Breach Derivative Suit Sent Home

Judge Thomas W. Thrash Jr. of the U.S. District Court of Georgia permanently shelved a derivative suit brought by shareholders of Home Depot. Home Depot is a multinational home improvement retailer. In September, 2014,...more

China Issues Its First Network Security Law

by Latham & Watkins LLP on

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

UK ICO recommends personal liability of directors for breaches of data protection law

by White & Case LLP on

At a recent Parliamentary meeting to discuss the draft Digital Economy Bill, the UK Information Commissioner recommended imposing personal liability and accountability upon company directors. If such liability is imposed, it...more

Cyber Risk and Reality – Procuring Transportation in the 21st Century

by Nossaman LLP on

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

WiFi Privacy: Network Analytics Guidance Issued by ICO

by Reed Smith on

The Information Commissioner’s Office (ICO) has issued guidance to help wireless (WiFi) operators understand their duties under the Data Protection Act 1998 (DPA) when collecting and using location and other analytics...more

Alert on Ransomware Attacks and Prevention

by Jackson Walker on

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

Advertising Law - March 2016

Tech Company Settles With FTC Over Installation of Apps Without Permission - A technology company that allegedly replaced a Web browser game with a program that installed apps on mobile devices without permission has...more

MFA – Multi-Factor Authentication

Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more

A New EU Era of Cybersecurity on the Horizon

by Reed Smith on

After almost three years, consensus has been finally reached on the text of the Network and Information Security (“NIS”) Directive, the first-ever, EU-wide cyber security regulation. The NIS Directive (or Cybersecurity...more

MEPs Agree to Europe’s First-Ever EU Cybersecurity Law

by Latham & Watkins LLP on

On December 7th, members of the European Parliament (MEPs) and the Luxembourg Presidency of the EU Council of Ministers provisionally agreed to the text of the long awaited network and information security directive also...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

by Reed Smith on

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

by Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

New challenges created by China’s new draft cybersecurity law

by Reed Smith on

In July 2015, China released its new draft cybersecurity law (the ‘Law’), which will potentially have far-reaching consequences for network operators and companies doing business in China....more

NIST Publishes Cybersecurity Standards Objectives

The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST...more

39 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.