Network Security

News & Analysis as of

WiFi Privacy: Network Analytics Guidance Issued by ICO

The Information Commissioner’s Office (ICO) has issued guidance to help wireless (WiFi) operators understand their duties under the Data Protection Act 1998 (DPA) when collecting and using location and other analytics...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

Advertising Law - March 2016

Tech Company Settles With FTC Over Installation of Apps Without Permission - A technology company that allegedly replaced a Web browser game with a program that installed apps on mobile devices without permission has...more

MFA – Multi-Factor Authentication

Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more

A New EU Era of Cybersecurity on the Horizon

After almost three years, consensus has been finally reached on the text of the Network and Information Security (“NIS”) Directive, the first-ever, EU-wide cyber security regulation. The NIS Directive (or Cybersecurity...more

MEPs Agree to Europe’s First-Ever EU Cybersecurity Law

On December 7th, members of the European Parliament (MEPs) and the Luxembourg Presidency of the EU Council of Ministers provisionally agreed to the text of the long awaited network and information security directive also...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

New challenges created by China’s new draft cybersecurity law

In July 2015, China released its new draft cybersecurity law (the ‘Law’), which will potentially have far-reaching consequences for network operators and companies doing business in China....more

NIST Publishes Cybersecurity Standards Objectives

The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST...more

China’s Draft Cybersecurity Law – A New Regime for Network Security

China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

T-Mobile Agrees to Pay FCC $17.5 Million to Settle 911 Outage Investigation

On July 16th, the Enforcement Bureau (Bureau) of the Federal Communications Commission (Commission) reached a $17.5 million Consent Decree with T-Mobile to resolve an investigation into two separate but related 911 service...more

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

US Department of Commerce proposes licensing requirements for export and transfer of cybersecurity items

In December 2013, the Wassenaar Arrangement - a group of 41 countries including the United States - agreed to add so-called cybersecurity items to its list of controlled dual-use items. On May 20, 2015, the Department of...more

International IT Companies Face Continuing Headwinds in China

Our September 16, 2014 client alert, “Brave New World? Recent Challenges Facing Foreign IT Companies in China,” discussed efforts by the Chinese government to enforce heightened network security standards, with a particular...more

Licensing Non-Employees to Access Microsoft Products on Your Servers

Many businesses have teams of third-party vendors to assist with their business operations or to provide independent services – like software development or website design – that require access to company servers. For...more

Target lessons: Network security, human element are factors in protecting data

Caught off guard by the very public outing in December 2013 of a data breach compromising the credit and debit card numbers of 40 million of its customers and affecting the personal information of 70 million more, Target...more

Privacy & Security Bits and Bytes

There has been so much news swirling in the data privacy and security world in the last few days, that it has been difficult to keep up. We’ll give you a roundup here....more

FTC Sends Message: Make Your Mobile App Secure

Mobile payments have become so commonplace that consumers rarely stop to think about whether their online payment is secure. Mobile app developers can fall into a similar trap of assuming that the necessary security measures...more

Do Not Forget to Lock the Backdoor: Adopting a Holistic Approach to Cybersecurity

While cybersecurity has traditionally focused on blocking attacks from the outside through perimeter defenses (e.g., firewalls, intrusion detection, penetration testing), unfolding facts concerning the recent Target data...more

27 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×