News & Analysis as of

National Institute of Standards and Technology Hackers Data Breach

Kohrman Jackson & Krantz LLP

Lessons Learned from Cleveland City Hall Cyber Attack

June 2024, Cleveland City Hall shut down due to what it initially described as a “cyber incident,” which was later explained as a ransomware attack. Many of the functions provided by City Hall stopped or significantly slowed,...more

Foley & Lardner LLP

Rolling With the Punches in a Networked World: CCOE Cybersecurity Panel Discussion

Foley & Lardner LLP on

Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more

Robinson+Cole Data Privacy + Security Insider

Chinese State Hackers Exploit Zero-Day Vulnerabilities in Citrix Networking Equipment

According to the National Security Agency, actors backed by the Chinese government are actively targeting a zero-day vulnerability in two commonly-used Citrix networking devices. The exploit (CVE-2022-27518) affects Citrix...more

Polsinelli

Emerging Threats: Cyber Attacks and Side-Channel Evolution

Polsinelli on

“Side-Channel” attacks generally refer to a type of criminal cyber attacker activity that exploits vulnerabilities so that the attacker can collect and analyze “leakage” of data from a device, as a means to identify certain...more

Kohrman Jackson & Krantz LLP

You’ve Been Hit by Ransomware: What Should You Do?

Despite your best efforts, you have been hit by ransomware. You are locked out of your system, and you can provide no services to your customers, clients or patients. From a business perspective, you need to get your system...more

Spilman Thomas & Battle, PLLC

Ransomware: Where We are and What is to Come

The technological era has wrought numerous changes in traditional crimes that have plagued society from time immemorial. Ransom attacks have long been recognized by criminals as a method of extracting money from a desperate...more

The Volkov Law Group

Ransomware and OFAC Sanctions Compliance

The Volkov Law Group on

We have all read about the high-profile malicious cyber-attacks and ransomware demands and payments.  The Colonial Pipeline case demonstrated how responsive law enforcement can be in tracking down perpetrators and recovering...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Health Care Compliance Association (HCCA)

To Combat Cyber Crime, White House Initiative Promises Tools; Some Seek Funding, New Laws

Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more

Bilzin Sumberg

Do the 2021 Federal Ransomware Laws Foretell Passage of Federal Data Privacy Laws?

Bilzin Sumberg on

In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more

King & Spalding

Ransomware on the Rise in Critical Infrastructure Sector

King & Spalding on

Recent ransomware attacks against U.S. critical infrastructure, which includes the energy sector’s production of oil and natural gas, and other sources of electricity and power, have shed a spotlight on the importance of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2021

Robinson & Cole LLP on

CYBERSECURITY - Ransomware Incident Compromises Unemployment Claim Information of 1.6M in WA - It is being reported that the Office of the Washington State Auditor (SAO) is investigating a security incident, allegedly...more

Robinson+Cole Data Privacy + Security Insider

Responding to Cyber-Attacks in the Utility and Energy Sectors

To assist utilities with assessing and responding to cyber risks, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) recently issued a report on best practices to...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cybersecurity Challenges and Incident Response Preparedness During the Coronavirus Pandemic

The spread of the novel coronavirus has upended Americans’ lives in a matter of months. While life outside has ground to a standstill in many regions of the country, much of corporate America is meeting the unique challenges...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2019

Robinson & Cole LLP on

The Wolcott school system in Wolcott, Connecticut has been recovering for four months from a ransomware attack that hit its system at the end of the school year. Last week, it was hit with a second attack. According to...more

King & Spalding

Why Complete an Enterprise Risk Assessment

King & Spalding on

Your Organization’s best defense in an environment of aggressive regulators and litigious plaintiffs’ counsel is the completion of an enterprise risk assessment. Regulators and attorneys general are fining–sometimes hundreds...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Robinson+Cole Data Privacy + Security Insider

Ohio Passes Law Providing Safe Harbor for Businesses Suffering Data Breach

The Ohio legislature recently passed S.B. 220, which gives businesses that suffer a data breach an affirmative defense against tort claims brought in class action suits....more

Burr & Forman

Cybersecurity Insights & Best Practices: May 2018

Burr & Forman on

Best Practices to Detect and Prevent File-Less and Click-Less Malware - Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 16

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - United States and China Renew Promise Not to Hack - On October 4, U.S. and Chinese officials agreed to not engage in targeted hacking. Per a...more

Patterson Belknap Webb & Tyler LLP

Cyber Week in Preview: SEC Hack, Equifax CEO on Hot Seat and Energy Sector Cyber Spend

As we start the new week, a recap of major cybersecurity developments: Equifax CEO Faces Senate Committee – Senate staffers are busy readying cross examination scripts for the testimony next week of Equifax Inc. Chief...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

Cooley LLP

Blog: GAO Criticizes HHS In Health Information Cybersecurity Report

Cooley LLP on

On Monday, the Government Accountability Office (“GAO”) released a report (the “Report”) criticizing the U.S. Department of Health and Human Services (“HHS”) security and privacy guidance and oversight in protecting...more

Pillsbury Winthrop Shaw Pittman LLP

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

BakerHostetler

Incident Response Practice Tip: Balance Meeting Breach Notification Deadlines With Securing Your Network

BakerHostetler on

State breach notification statutes are being amended on almost a monthly basis. Several laws have, or will soon have, a mandatory notification deadline for notifying affected individuals after the discovery of the incident....more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide