Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Four Security Gaps Cybercriminals Exploit in Your Business's Digital Storefront

Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more

Fitbit IPO Cyber Risk Disclosures

Earlier this month, fitness-tracking company Fitbit, Inc. filed a Form S-1 Registration Statement for an IPO of up to $100 million that exhaustively disclosed potential cybersecurity risks with respect to the personal data...more

Inside Insight: How the FTC Approaches Data Breach Investigations

A data breach hurts in a myriad of ways – the tarnished image of the breached company, the diminished consumer trust, and the bottom-line impact of remedial costs and lost business. The last thing a company already reeling...more

Strict Controls Proposed on the Export of Cybersecurity Items

On May 20, 2015, the Commerce Department Bureau of Industry and Security (BIS) proposed to establish controls on the export of cybersecurity items. These items would be classified under new Export Control Classification...more

Advertising Law - May 2015 #4

SPECIAL FOCUS: The Impact of the Supreme Court’s Octane Fitness Decision on Lanham Act Litigation - For the second time in recent years, a Supreme Court decision in a patent case is having a major impact on Lanham Act...more

Law à la Mode - Edition 16 - May 2015 (Global)

In This Issues: - Key Considerations: For Negotiating Electronic Point Of Sale Solution Agreements - Fashion Forward And Tech Savvy: The Co-Branding Of Wearable Technologies - The Internet Of Things: The...more

Damage Control: After an Insider Breach

In the immediate aftermath of a major security or data breach companies should re-evaluate their risk management systems. In a previous post on insider threats, we outline what a company can do to prevent risks associated...more

Finding a Cyber Safe Harbor in the SAFETY Act

Does your company provide or use a cybersecurity product or service? Are you concerned about the potential liability for yourself, your distributors and your customers if your cybersecurity product is used in an attempt to...more

Adult FriendFinder confirms data breach of its users’ personal information

On May 22, 2015, an online dating service called Adult FriendFinder confirmed that there had been a data breach of some of its 64 million users’ personal information. In an online notice to its users, Adult FriendFinder said...more

Another Prologue to Cybersecurity Regulations: Controlled Unclassified Information (“CUI”) – What Contractors Need to Know and Why...

Government contractors should take note of a proposed new rule that could impose significant new data storage obligations when finalized. The Federal Government is taking another baby-step towards cybersecurity regulation...more

Cyber Information Sharing: Legislation Roundup

With an increasing number of high-profile data breaches in the news, both the U.S. Senate and the House of Representatives have pushed forward on several data security and privacy bills. In the recent months, lawmakers have...more

With the IRS breach, it’s clear your data is at risk

The Internal Revenue Service (IRS) released on Tuesday, May 26, 2015, news of a major data breach, estimated to have affected 100,000 U.S. households’ tax returns. The data was wrongfully obtained from an IRS application...more

CFTC Announces Agenda For Upcoming Market Risk Advisory Committee Meeting

The Commodity Futures Trading Commission’s Market Risk Advisory Committee (MRAC) announced its agenda for its upcoming meeting on June 2. MRAC will discuss: (1) the Bank of England’s CBEST Program and its impact on addressing...more

IRS Data Breach Results in Thousands of Fraudulent Tax Returns

On Tuesday, May 26th, 2015, the IRS disclosed that a data breach of its online Get Transcript application occurred when sophisticated hackers attempted to access over 200,000 personal tax accounts. More importantly, however,...more

Healthcare Organizations not Immune from Criminal Attacks on Sensitive Information

This month, the Ponemon Institute released its Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data and its findings are generating a good deal of attention. In the past, the Study has found that most data...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

BIS Proposes Broad New Licensing Requirements for Exports Involving Cybersecurity Technology

In December 2013, members of the Wassenaar Arrangement, a group of 41 countries, which includes the United States, agreed to broaden its list of dual-use controls to include certain cybersecurity items. The new items added to...more

Cybercrime on the Rise: Targeting Banking Institutions and Insurance Companies

Security experts are warning that 2015 is the “Year of the Healthcare Hack” as media outlets continue to report on a number of high-profile companies that have recently experienced attacks by cybercriminals seeking valuable...more

Federal Trade Commission Signals Intensified Focus on Security-By-Design and the Internet of Things With New Start with Security...

The Federal Trade Commission (FTC) recently launched a new Start with Security initiative that aims to provide businesses with resources, education and guidance on best practices for data security. Announced by FTC Consumer...more

Will Your Cyber Insurance Respond When You Need It Most?

On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more

EU Council Confirms the Forthcoming Strong Enforcement of Fundamental Right to Data Protection

A recent leaked draft proposal reveals the position of the E.U. Council as regards to the fines system that will come into force under the proposed new General Data Protection Regulation in the E.U. member states. The huge...more

Blog: CareFirst Discloses Data Breach

CareFirst, a Blue Cross Blue Shield plan serving the Washington D.C. metro area, became another in a line of health insurers to suffer a data breach as a result of hackers. CareFirst and the FBI are examining the breach...more

SEC’s Division of Investment Management issues new Cybersecurity Guidance

There’s certainly no shortage of media attention on data security breaches lately, and there’s a good reason for that: such breaches are at an all-time high. Against this backdrop of the ever-increasing risk of malicious...more

Hackers seek to access intellectual property assets of higher educational institutions

College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more

FTC sued by blogger to release data security guidelines

The Federal Trade Commission (FTC) was sued this week by Philip Reitinger, a fellow blogger and former Deputy Undersecretary of the Department of Homeland Security. He is now President of VisionSpear LLC, an information...more

1,762 Results
|
View per page
Page: of 71

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×