Network Security

News & Analysis as of

US Department of Commerce proposes licensing requirements for export and transfer of cybersecurity items

In December 2013, the Wassenaar Arrangement - a group of 41 countries including the United States - agreed to add so-called cybersecurity items to its list of controlled dual-use items. On May 20, 2015, the Department of...more

International IT Companies Face Continuing Headwinds in China

Our September 16, 2014 client alert, “Brave New World? Recent Challenges Facing Foreign IT Companies in China,” discussed efforts by the Chinese government to enforce heightened network security standards, with a particular...more

Licensing Non-Employees to Access Microsoft Products on Your Servers

Many businesses have teams of third-party vendors to assist with their business operations or to provide independent services – like software development or website design – that require access to company servers. For...more

Target lessons: Network security, human element are factors in protecting data

Caught off guard by the very public outing in December 2013 of a data breach compromising the credit and debit card numbers of 40 million of its customers and affecting the personal information of 70 million more, Target...more

Privacy & Security Bits and Bytes

There has been so much news swirling in the data privacy and security world in the last few days, that it has been difficult to keep up. We’ll give you a roundup here....more

FTC Sends Message: Make Your Mobile App Secure

Mobile payments have become so commonplace that consumers rarely stop to think about whether their online payment is secure. Mobile app developers can fall into a similar trap of assuming that the necessary security measures...more

Do Not Forget to Lock the Backdoor: Adopting a Holistic Approach to Cybersecurity

While cybersecurity has traditionally focused on blocking attacks from the outside through perimeter defenses (e.g., firewalls, intrusion detection, penetration testing), unfolding facts concerning the recent Target data...more

EU Proposed Directive on Network and Information Security

On 7 February, the European Commission (EC) published an EU Cyber Security Strategy encompassing a proposed Directive on Network and Information Security (NIS Directive). The aim of the Strategy and NIS Directive is to...more

Skadden's 2013 Insights: Regulatory

Communications Law: The Relentless Pursuit of Broadband Competition - As the Obama administration enters its second term, the Federal Communications Commission (FCC or Commission) is one of many federal agencies likely...more

9 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×