Latest Posts › Cyber Attacks

Share:

Biden Administration Aims to Shift Liability for Cyberattacks to Software Developers

In response to major cyber-related attacks caused by software security flaws, such as the SolarWinds breach, the Biden administration is gearing up to crack down on software providers that distribute products with security...more

Fighting the Constantly Evolving Threat of Cybercrimes [Audio]

On this episode of Regulatory Matters, Elizabeth Roper, Chief of the Cybercrime and Identity Theft Bureau at the Manhattan District Attorney's Office, talks with Kathleen A. McGee about her career in what is still a...more

How to Protect your Organization From a Cybersecurity Attack [Video]

In this first session in our Cybersecurity Awareness Series, discover how to implement the “ounce of prevention, pound of cure” approach–specifically, what your organization can do to create a cybersecurity plan and...more

Phishing: Cybersecurity’s Biggest Threat [Video]

Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more

How to Prepare for a Cybersecurity Breach [Video]

In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more

Colonial Pipeline Ransomware Event Highlights Need For Crisis Management Plan

The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more

FTC Publishes Blog Outlining Corporate Board Guidance For Data Security

Yesterday, the Federal Trade Commission (FTC) published data security guidance on their business blog that should be taken seriously by any corporate board. The article, “Corporate Boards: Don’t Underestimate Your Role in...more

Recent Decision Highlights Considerations For Asserting Privilege In The Wake Of A Cyberattack

“Malicious cyberattacks have unfortunately become a routine part of our modern digital world.” Wengui v. Clark Hill, PLC, Civil Action No. 19-3195, slip op. at 1 (D.D.C. Jan 12. 2021). When a data breach occurs, in-house...more

Rising Supply Chain Risk Requires Proactive Management

As the roughly 18,000 organizations, government agencies and educational institutions continue to recover from last year’s SolarWinds nation-state attack, one of the biggest takeaways from this event is that organizations...more

Beware Of Paying That Ransomware Threat

At a time when the U.S. healthcare system is already overwhelmed by the COVID-19 pandemic, hospitals and healthcare companies have been hit with an unprecedented number of ransomware attacks. A joint cybersecurity advisory...more

Petco Cyberattack Serves as Useful Reminder of Best Practices for Preventing Data Breach

A putative consumer class action filed in California state court on Friday the 18th against Petco Animal Supplies Stores Inc. (Petco) and its wholly owned subsidiary PupBox Inc. (PupBox) alleges that between February and...more

Recent Cyber Event Places Many Entities’ Data At Risk

As reported by Bloomberg and other news outlets, a major cyber security intrusion attributed to Russian state hackers, known by the nicknames APT29 or Cozy Bear, has sent cybersecurity experts into emergency mode as they work...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide