Latest Posts › Data Security

Share:

FTC Releases Warning to Companies that Fail to Mitigate Log4j Vulnerability

Less than a month ago, a critical vulnerability was identified in the ubiquitous, open source Log4j tool prompting swift guidance from Cybersecurity and Infrastructure Security Agency (CISA) and other security practitioners. ...more

CISA Issues Statement on Log4j Critical Vulnerability

Log4j is a java-based tool from Apache’s open source library used for parsing logs that never seems to have made headlines before this past weekend.  Now, following the December 9th public announcement of a vulnerability in...more

Department of Justice Announces New Civil Fraud Cybersecurity Enforcement Team

On October 6, 2021, Deputy Attorney General Lisa O. Monaco announced the launch of the Department of Justice’s Civil Cyber-Fraud Initiative. The Department plans to use civil enforcement tools to “pursue…those who are...more

Biden Administration To Issue Cybersecurity “Performance Goals” For Critical Infrastructure

Yesterday, the Biden Administration issued a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems (“Memorandum”).  A short summary is below.  However, the primary take away is...more

U.S. and Allies Formally Accuse China of Microsoft Hack and Cyberespionage

On July 19, 2021, the Biden administration, along with a group of allies publicly accused the Chinese government of malicious cyber activities and irresponsible state behavior.  The joint announcement states the U.S....more

Fifth Circuit Decision Raises Cyber Enforcement Complications for the U.S. Department of Health and Human Services

As the Biden administration begins detailing its regulatory and enforcement priorities, it faces a new challenge on the health data privacy and security front. In University of Texas M.D. Anderson Cancer Center v. United...more

COVID-19 and HIPAA: Privacy, Security, and Breach Response During a Global Pandemic

There’s more than a virus in the air – there’s malware and spyware too. Our Health Care and Cybersecurity Preparedness & Response Groups team up to list proactive steps HIPAA covered entities and business associates can take...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide