Latest Posts › Cybersecurity

Share:

Code Red: The FDA’s Artificial Intelligence/Machine Learning Action Plan Poses Potential Risks for Medical Device Makers

Q: The FDA’s stance on a regulatory framework for artificial intelligence and machine learning (AI/ML) software as a medical device is continuously evolving. Could you explain the history? A: Artificial intelligence (AI) is...more

Data Security Year in Review

October marks the seventeenth annual National Cybersecurity Awareness month in the United States and provides an opportune moment to take stock of an extraordinary year. The past year has seen a rise in high-profile data...more

Treasury Department Warns of Potential Sanctions to Organizations Paying to Resolve Ransomware Attacks

Ransomware attacks – cyber attacks in which the hackers encrypt and disable an organization’s computers and demand a ransom to provide the decryption key – continue to hit organizations throughout the country. Perhaps even...more

COVID-19 Security Alert: 10 Reminders for Employees Working Remotely

The security and confidentiality of a company’s data is paramount. As businesses grapple with the COVID-19 pandemic and the need for employees to work remotely, it is important to remain focused on ensuring the security and...more

The SHIELD Act: NY’s Expanded Security Requirements and Data Breach Notification Law Asks More of Businesses (and not just those...

Earlier this month the Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act") went into effect. The law, which was signed in July of last year by Governor Andrew Cuomo, makes several important changes to New...more

COVID-19 and Its Impact on Data Privacy and Security

Organizations across the United States are preparing to respond to increasingly dire warnings from public health authorities and the need to take action to mitigate the spread of the coronavirus and the disease it causes,...more

Code Blue: Cybersecurity Vulnerabilities for Medical Device Makers Require Urgent Care

Q: How is the shift of medical devices moving to the Internet of Things affecting the health care industry? A: Connected medical devices routinely record sensitive health information about a patient. This critical...more

How to Structure Your Organization’s Cybersecurity Management

Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more

Breaches and the Boardroom: How Directors Can Avoid Liability for Data Breaches

“Where was the Board?” is asked every time a major hacking causes yet another data breach. Data breaches and ransomware attacks occur every day, with massive impacts on companies’ finances, market value, and reputation. In...more

How Community Banks Can Overcome Cybersecurity Paralysis

Tom Curry, a partner in Nutter’s Corporate and Transactions Department and a co-leader of the firm’s Banking and Financial Services Group, and Seth Berman, a partner and leader of Nutter’s Privacy and Data Security practice...more

Meltdown and Spectre Vulnerabilities: New Year, New Cyber Threat

The first week of January 2018 brought disturbing news on the cyber security front – and for once it was not the result of corporate ineptitude or poorly designed software. Actually, it was far worse. Independent security...more

Cyber Criminals Take Uber for a Ride

The near-daily reports of massive hacking incidents continue to demonstrate a shocking level of corporate incompetence. In September, we learned of the Equifax breach, which was breathtaking both in its scope and in Equifax’s...more

The Intersection of Human Resources and Cybersecurity: How to Mitigate Threats from Within: Insights from Nutter’s Seth Berman

Seth Berman, a partner in Nutter’s Litigation Department and a leader of the firm’s Privacy and Data Security practice group, analyzed the intersection of cybersecurity and human resources in Nutter Insights. Seth outlined...more

Wire Fraud Scams and Corporate Email Attacks: Beware of Tricks, Not Treats, During Cyber Security Awareness Month

The U.S. Department of Homeland Security named October “National Cyber Security Awareness Month,” and has given it the not-so catchy acronym of NCSAM. Though one might quibble with the choice of name, the many spectacular...more

Equifax Breach: Lessons Corporations Must Learn from Equifax’s Poor Planning and Response

Equifax’s stunning security breach and inadequate response has now claimed its most prominent victim – the CEO of Equifax, Richard Smith, announced his immediate resignation. In light of this rapid fall from grace, here...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide