Latest Posts › Cyber Attacks

Share:

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Will an Act of War Destroy Your Cyberinsurance Coverage?

Cyberinsurance spurs many complaints from US business. The cost is skyrocketing, retentions (deductibles) are rising quickly, and the insurance companies push their own panel lawyers on customers despite other relationships....more

Legislation Requiring Reporting of Certain Cyber Incidents Enacted

President Biden has signed into law the Consolidated Appropriations Act of 2022 (2022 CAA), which includes the Cyber Incident Reporting for Critical Infrastructure Act (Cyber Incident Reporting Act). The Cyber Incident...more

Russian War Affects Tech and IP

Russia initiated a full-scale invasion of one of its sovereign neighbors and the Western world has responded with censure and fury. Our governments and financial institutions have cut off Russian access to money....more

Hidden Threats of Exposing Your Phone Number

This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more

The Commercial Gap in Digital Security

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

Easy Hacking Tools Facilitate Bad Behavior

A few years ago, if you wanted to wreak havoc online, you needed some skill. You needed to understand coding and how to break into other computers.  You needed to develop attack bots and probe for vulnerabilities....more

NIST Cybersecurity Framework 1.1: A blueprint for compliance and assurance

In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more

Important Steps to Prepare for the WannaCry Ransomware Attack

Your business may have been victim to the latest ransomware attack, or it may be caught in the next wave. On May 12, 2017, the “WannaCry” ransomware attack compromised over 70,000 organizations in nearly 100...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide