News & Analysis as of

Software Security Standards

Polsinelli

For OT Cybersecurity, Extra Time is Running Out

Polsinelli on

Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more

Snell & Wilmer

White House Issues Executive Order on Improving Nation’s Cybersecurity

Snell & Wilmer on

Last week, the White House issued a new Executive Order (the “EO” or “Order”) on cybersecurity. The EO responds to ever-increasing malicious cyber campaigns threatening the public and private sectors and the American people’s...more

Morgan Lewis - Tech & Sourcing

Contract Corner: Key Differences Between SaaS and On-Premise Software Agreements

There are two primary models by which vendors will make software available to customers (1) software as a service (SaaS); and (2) on premise. In a SaaS model, the vendor provides, maintains, and hosts (either itself or...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #79 – Consumer Reports Will Help Us With Privacy + Security of Products

What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more

Orrick, Herrington & Sutcliffe LLP

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

Robinson+Cole Data Privacy + Security Insider

FTC Charges Taipei Based D-Link for Inadequate Security of Computer Routers and Cameras

The Federal Trade Commission (FTC) has filed a complaint in Northern California against D-Link for putting thousands of consumers at risk over the past decade for failing to have adequate security practices in its routers and...more

Robinson+Cole Data Privacy + Security Insider

Toys Not Immune from Scrutiny Over Privacy and Security Weaknesses

In the wake of the holiday season, it seems that even toys are not immune from privacy and security pitfalls. Two “connected” toys, Genesis Toys’ My Friend Cayla and i-Que robot, have been accused of violating U.S. and...more

Butler Snow LLP

Health Hackers: Problems in Applying Traditional Products Liability Theories to Latent Cyber-Vulnerabilities in Medical Devices

Butler Snow LLP on

October is National Cyber Security Awareness Month (yes, that’s a thing), so it seems fitting to write about an unprecedented alert recently released by the FDA to health care providers that warned of a medical device’s...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide