Latest Posts › Cyber Attacks

Share:

Fiduciary Duty in the Digital Age: Cybersecurity Best Practices for ERISA Plans

Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more

Cyber 101: Understand the Basics of Cyber Liability Insurance

Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more

How to Hire a CISO as Scrutiny Intensifies

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Deepfakes and the Use of AI in Cyberattacks

The headlines about a $25 million wire transfer fraud employing deepfake technology have rightfully given chief financial officers and finance departments considerable pause. The attack began with a phishing email delivered...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide