Latest Posts › Cybersecurity

Share:

FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks

Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more

SEC Adopts Cyber Regulations

On July 26, 2023, the Securities and Exchange Commission (SEC) adopted rules requiring disclosure of material cybersecurity incidents as well as periodic disclosure of cybersecurity risk, management, strategy, and governance...more

The Cybersecurity and Infrastructure Security Agency Tells K-12 Institutions to Start Small, Build Up, and Collaborate to Fight...

With the adoption of new technology, including the quick and unexpected shift to virtual learning because of the COVID-19 pandemic, K-12 institutions are at an increased risk of cyberattacks and threats thereof. The rise in...more

ChatGPT Writes a Blog Post About Itself.

Editors’ Note:  How does ChatGPT fare in writing a law firm blog post?  We asked ChatGPT to write one . . .  PROMPT:  Write a 500 word blog post, in the style of a law firm blog post, on ChatGPT, focusing in particular on...more

SEC’s Expansion of Crypto Assets and Cyber Unit Signals Increased Enforcement Ahead

In a move that further executes upon the SEC’s increasingly tough rhetoric on cryptocurrency and cybersecurity, SEC Enforcement recently announced that it will nearly double the size of its newly-renamed Crypto Assets and...more

[Webinar] How to Prevent and Respond to Business Email Compromises - April 26th, 12:30 pm - 1:30 pm ET

Please join us for a discussion and Q&A regarding the growing threat of business email compromises (a.k.a. man-in-the-middle attacks). Attorneys Chris Hart and Yoni Bard, litigators with experience in privacy matters and...more

United Nations Working Group Approves Cybersecurity Report: What is it and What are the Implications?

On 12 March 2021, the United Nations Open-ended Working Group (“OEWG”), established by General Assembly Resolution 73/27 and consisting of all United Nations Member States, adopted by consensus its Final Substantive Report on...more

The Equifax/Massachusetts Attorney General Consent Judgment: A Guide for Privacy and Security Compliance

What do businesses need to do to comply with privacy and data security laws? The first place to look is to relevant statutes. If you store or process the personal information of Massachusetts residents, then you will at...more

A Spate of Legislative Action Portends a Busy Year in Privacy and Security

The new decade has barely begun, and the world of privacy already seems set to change quickly. Here is a brief overview: New Laws In Effect as of January 1 - On January 1, 2020, new data breach notification requirements...more

Beyond the Privacy Policy: Toward Effective Data Governance

Shifting how businesses think about privacy. Let’s stop thinking about privacy policies alone, and let’s start thinking about data governance plans. For the ordinary business trying to generate revenue and minimize risk,...more

Is Your Company Ready for the CCPA?

If you are doing business in California, the way you handle personal data could soon change in significant ways. The California Consumer Privacy Act (“CCPA”) goes into effect on January 1, 2020, and the time to start...more

Minimizing Risk and Liability from Man in the Middle Attacks (or, How to Keep Your Company’s Wire Transfers from Going Awry)

Imagine this scenario: you’ve had a productive and mutually advantageous ongoing contractual relationship of several years with another party. You have built up quite a bit of trust over the years, and communicate regularly...more

Cybersecurity 2019: Data Privacy Trends

In 2018, privacy and data security crossed a number of thresholds. In the public mind, through high-profile data breaches and revelations about unexpected uses of personal information, questions of privacy became much more...more

California Passes New Data Privacy Law With National Implications

The California Consumer Privacy Act of 2018 (the “CCPA”) was signed into law on June 28, 2018. Although it is a state law, it has national and international ramifications. ...more

DHS Amplifies Call for Public-Private Partnership in Cyberdefense and Pledges to “Intervene Directly”

The worldwide WannaCry attack from May 2017 has been officially blamed on North Korea. In a press briefing publicly announcing the Administration’s declaration of North Korean culpability, the Department of Homeland Security...more

FCC and Net Neutrality — Some Predictions about the Fallout

The end of net neutrality — for now — is big news, because it’s a big deal; there’s just no getting around the fact that the way consumers experience the internet is going to change. What are some of the practical...more

Security in our Decentralized Election System: News from DHS

After repeated requests from various states, the Department of Homeland Security informed state governments which states had their election systems hacked or otherwise compromised during the 2016 general election. According...more

Kaspersky Lab and Due Diligence – How Do You Minimize Risk?

Kaspersky Lab, a Russian-owned cybersecurity company that sells anti-virus software and other kinds of IT systems security products, has been banned from use by the federal government. This latest development comes by way of...more

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

New Duties for Lawyers? The ABA Weighs In on Cybersecurity.

Recently, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, which aims to provide guidance and clarity to lawyers as they consider what level of security to give communications...more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

Standing hurdles continue to bedevil data breach plaintiffs

Plaintiffs presenting a claim in federal court must have standing to sue, under Article III of the Constitution (as we have written about in the past). The Second Circuit recently entered an order reminding plaintiffs,...more

Cybersecurity, A-Z: A is for Active Cyber Defense

(First in a continuing series.) Active Cyber Defense, or ACD, is a broad category encompassing different kinds of actions that organizations can take to defend against breaches and cyberattacks. The operative word is...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide