Latest Posts › Cybersecurity

Share:

Six Lessons For Your Organization From the SolarWinds Affair

The major current cybersecurity story involves a popular SolarWinds network managing software package, Orion. A sophisticated actor, with the signatures of a nation state, infiltrated Orion in a software update. Once inside,...more

Court Compels Discovery of Cyber Expert Report in Litigation

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

2021 and Beyond: The Top Ten Upcoming Changes In Privacy And Cyber Security

2020 was a year like no other. From an unprecedented “work from home” shift to a blockbuster European court ruling to a mammoth cyber attack, businesses scrambled to adapt to an endless series of cyber challenges. 2021 shows...more

European Union Publishes Draft Standard Clauses for Trans-Atlantic Data Transfers

Data Transfer from the European Union to the United States is a knotty process. The difficulties were compounded this summer when Europe’s highest court held the “Privacy Shield” program enabling U.S-E.U. data transfers...more

Crime Does Pay: Business Email Compromise, Organization Vulnerability, and How Hackers Attacked the Wisconsin Republican Party

We have previously written about “phishing.” Phishing involves using social pressure  to trick the recipient to send sensitive information,  network control, or credentials, to hackers posing as authorized users....more

New York Fires First Salvo Under Cybersecurity Law

The New York Department of Financial Services (NYDFS) has launched its first enforcement action under New York’s Cybersecurity law for financial services, so-called Part 500. Part 500 requires NYDFS licensed institutions to...more

HIPAA, Google, and Article III Standing, With a Nod to Kim Kardashian

In a ruling that could have broad ramifications for health data sharing, a federal judge has ruled that a patient complaining about a hospital sharing his health data without permission lacked standing because he suffered no...more

The Good, the Bad, and the Ugly: Standard Contractual Clauses After Schrems II

Countless businesses export data from the European Union to the United States. Does your human resources office have information on European employees? The sales department information on European clients? That is personal...more

Privacy Shield Falls-“Schrems II” and the Aftermath

The sword finally fell. Last week, the European Union’s (EU) highest court, the Court of Justice (CJEU) invalidated Privacy Shield. Privacy Shield was a legal framework that enabled EU companies to process data in the United...more

When Does Web Scraping Become Trade Secret Misappropriation? The Eleventh Circuit Weighs In

In Compulife Software Inc. v. Newman, No. 18-12004, 2020 WL 2549505 (11th Cir. May 20, 2020), the Eleventh Circuit vacated a trial court ruling that competitors who used a website operator’s server and database did not...more

COVID-19 Cyber Attacks: Ten Tips for Healthcare And Other Organizations

The United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) has warned of escalating cyber-attacks on organizations working on the COVID-19 pandemic. CISA, the FBI, and the...more

Cybersecurity and Incident Response In A Time of Coronavirus

We enjoy Jerry Bruckheimer movies. Living in one is another matter. COVID-19 has generated scenes that give us pause. An empty Times Square. A Los Angeles with moving traffic. A Washington eerie in its silence. Closed stores....more

The Top Ten Employer Cybersecurity Concerns For Employees Regarding Remote Work

Employers are responding to COVID-19 by allowing, and even mandating remote working. Companies ranging from Amazon, Microsoft, and Google to local design shops have asked employees to work from home. While increasingly common...more

Ten Things To Know About North Carolina's Data Protection Bill

As Congress continues to wrestle with federal privacy legislation, the states have been lining up alternative proposals. North Carolina has introduced its own bipartisan bill. The bill, H.B 904, will not pass this year. Even...more

HIPAA Breach Settles for $1M in First Settlement Involving State Attorneys General

Last week, Indiana based Medical Informatics Engineering, Inc. (MIE) agreed to pay $100,000 to the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR). MIE provides electronic health record and related...more

Ten Tips On Cyber Liability Insurance

IT, we have a problem. Reports of cybersecurity incidents continue to come in thick and fast. In November 2017, Equifax announced a mammoth data breach that it estimated would cost more than $140 million to address....more

The SEC Fines Yahoo for Alleged Failure to Disclose CyberBreach

The Securities and Exchange Commission (SEC) has undertaken its first enforcement action in connection with a public company’s failure to timely disclose cyber-issues. Last month, Altaba Inc., the former Yahoo! Inc. (Yahoo!),...more

Some Final Thoughts as GDPR Takes Effect on May 25

Given recent headlines, ranging from Facebook to Cambridge Analytica to the City of Atlanta’s ransomware attack, the logical inference is that the European Union’s General Data Protection Regulation (GDPR) is a product of our...more

Lessons from the Equifax Breach

As data breaches go, they don’t get much bigger than this. On Thursday, September 7, credit reporting giant, Equifax, reported that it had suffered a cyber-incident. 143 million consumer records, including names, birth dates,...more

CyberSecurity Concerns - Hackers, The Seventh Fleet And Human Error

When the USS John S. McCain collided with the tanker Alnic MC near Singapore, it was the third such collision this summer. The ship sustained damage at the waterline, flooding a crew sleeping area. Such incidents are...more

Wave of Ransomware Attacks Cripples Dozens of Institutions Worldwide Including Britain’s NHS

Movie buffs are familiar with a favored narrative arc: something with tremendous power, such as the Ebola virus, escapes from its clinical confines and proceeds to wreak havoc on the world. (It also works with aliens, ghosts,...more

5/15/2017  /  Cyber Attacks , Cybersecurity , Ransomware , UK

The Empire (State) Strikes Back: Six Highlights of New York’s New Cybersecurity Regulations for Financial Institutions

The New York Department of Financial Services (NYDFS)’s finalized Cybersecurity Requirements for Financial Services Companies (“regulations”), went into effect on March 1, 2017. NYDFS has provided a 6 month safe harbor to...more

Blame Hollywood: A Conversation with Stewart Baker, former General Counsel of the National Security Agency

Editor's Note: In the world of cyber law, privacy and cybersecurity, one of the largest and most colorful figures is Stewart Baker, whose resume includes a stint as General Counsel at the National Security Agency and...more

Locked in Sixty Seconds: Ransomware, Remote Access, and the Brave New Internet of Things

A few months ago, we analyzed ransomware incidents and offered some suggestions for handling an episode. Ransomware is a cyberattack in which a hacker uses malware to take control of computer systems. The system owner is...more

Why The Election Can’t Be Hacked: Internet Of Things Edition.

In our consulting days, a former boss – a retired Army Colonel – enjoyed sharing his Cold War recommendation for protecting sensitive documents from the KGB: fill up a fleet of tractor-trailers with every U.S. government...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide