News & Analysis as of

Networks Cybersecurity

BakerHostetler

Let’s Get Physical - OCR Issues Reminder that HIPAA Security Isn’t Just Technical

BakerHostetler on

While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Mintz - Privacy & Cybersecurity Viewpoints

CRITICAL ALERT: Log4Shell

We want to make our readers and your security operations aware of a critical vulnerability that is actively being exploited in the wild. CVE-2021-44228 can easily be exploited to gain complete access to the targeted...more

Bass, Berry & Sims PLC

Privacy Peril: AdiOs, Wi-Fi

Bass, Berry & Sims PLC on

We have warned several times of the dangers of using public Wi-Fi networks (e.g., “I Spy Your Wi-Fi” from September 2018 and March 2020). For iPhone users, a newly-detected vulnerability risked serious damage to your phone’s...more

Faegre Drinker Biddle & Reath LLP

Non-Techies – Protect Your Digital Data by Securing Your Home and Business Wi-Fi

I spent over 22 years in the FBI performing criminal cyber and forensics investigations. Many of these investigations led us to people who were innocent of the alleged crimes but who were guilty of unknowingly allowing...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 7, September 2020

U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more

Jackson Lewis P.C.

NSA Releases Helpful Guidance For Limiting Location Data Exposure

Jackson Lewis P.C. on

The National Security Agency (NSA) recently released helpful guidance on how to effectively limit location data exposure for its staffers, which also can be helpful information for the general public. Businesses likely will...more

Faegre Drinker Biddle & Reath LLP

Disruption IV: The New Threat Disruptionware Poses to the American Energy Sector

Over the past few months, I have written about the threat first identified by the Institute for Critical Infrastructure Technology (ICIT) called disruptionware. We have previously described what disruptionware is, how it...more

Pillsbury Winthrop Shaw Pittman LLP

Supply Chain Threats and Cybersecurity Compliance Issues on the Horizon

New rules and developments continue to proliferate as the U.S. government seeks to minimize supply chain threats and cybersecurity risks. For contract awards issued after August 13, 2020, prime contractors must conduct a...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

9 Telecommuting Tips for Employers as COVID-19 Spreads Across the United States

As COVID-19 continues to spread across the United States, it is anticipated that a large portion of the workforce will be asked to work from home for their own protection and for the protection of others. Working from home...more

Miller Canfield

Cybersecurity and Business Liabilities to Avoid When Using Remote-Work Technology

Miller Canfield on

As employers respond to the ongoing COVID-19 coronavirus pandemic, many are implementing work-from-home policies and establishing situational teleworking opportunities for their employees. While remote-work technology can...more

Nutter McClennen & Fish LLP

COVID-19 and Its Impact on Data Privacy and Security

Organizations across the United States are preparing to respond to increasingly dire warnings from public health authorities and the need to take action to mitigate the spread of the coronavirus and the disease it causes,...more

White & Case LLP

US Designates Huawei to Entity List, Issues Temporary General License

White & Case LLP on

The US Commerce Department’s Bureau of Industry and Security (BIS) added Huawei Technologies Co., Ltd. (Huawei) and 68 non-US Huawei affiliates to the BIS Entity List, effective May 16, 2019, at 4:15 p.m. Eastern Daylight...more

Jones Day

Implementing China’s Cybersecurity Law

Jones Day on

China’s Cybersecurity Law was issued on November 7, 2016, by the Standing Committee of the National People’s Congress, and it came into effect on June 1, 2017. The Cybersecurity Law marks the first comprehensive law in China...more

Dechert LLP

Trump Executive Order Addresses Executive Branch, Critical Infrastructure Cybersecurity

Dechert LLP on

President Donald J. Trump issued an Executive Order on May 11, 2017 aimed at “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” (the “Order”). The Order mandates federal governmental review of...more

Snell & Wilmer

FTC sues IoT Device Manufacturer D-Link for Lax Cyber Security Practices

Snell & Wilmer on

On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more

Pillsbury Winthrop Shaw Pittman LLP

The New Cybersecurity Law—New Compliance Focus for Enterprises in China

On November 7, 2016, the Standing Committee of the National People’s Congress (NPC) of the People’s Republic of China (PRC) passed the final Cybersecurity Law (CSL) after three rounds of review by the NPC since June 2015....more

Patterson Belknap Webb & Tyler LLP

DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman

This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk...more

Patterson Belknap Webb & Tyler LLP

China’s Controversial New Cybersecurity Law

Earlier today, the Chinese government in Beijing approved a sweeping new cybersecurity law aimed at centralizing control over computer networks operating within China’s borders. The new law is broadly drafted and...more

Fenwick & West LLP

[Event] Data Breaches - What To Do When Your Client Falls Victim - September 28th, Mountain View, CA

Fenwick & West LLP on

The number of data breaches has risen significantly in the past few years. More and more companies, both large and small, are having their computer networks compromised and are looking for guidance on how to respond. This...more

Alston & Bird

EU Institutions Adopt First Pan-European Legislation on Cybersecurity

Alston & Bird on

On December 7, 2015, after more than two years of legislative consideration, the European Union adopted the Directive on Network and Information Security (“NIS Directive”). Under the NIS Directive, operators of essential...more

Mintz - Privacy & Cybersecurity Viewpoints

Cyber Risks for the Boardroom Part 1: The Recent Increase in Focus on Privacy Issues

Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more

Saul Ewing Arnstein & Lehr LLP

Heartbleed Bug Creates Risk for Businesses and Consumers

On April 8, 2014, several news agencies, including the New York Times and CNN, reported the discovery of a vulnerability in a core security protocol used by an estimated two-thirds of the world’s servers. The vulnerability...more

Mintz - Privacy & Cybersecurity Viewpoints

FCC: Carriers Must Protect Certain Data Collected on Mobile Handsets

Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more

King & Spalding

European Commission Publishes Cybersecurity Strategy and a Proposed Directive on Network and Information Security that Would...

King & Spalding on

On 7 February 2013, the European Commission published two cybersecurity documents designed to provide a comprehensive vision of how European Union Member States, national authorities, and private industry will prevent and...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide