Latest Posts › Data Security

Share:

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Can Artificial Intelligence assist with cybersecurity management?

AI has great capability to both harm and to protect in a cybersecurity context. As with the development of any new technology, the benefits provided through correct and successful use of AI are inevitably coupled with the...more

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

New Data Privacy Laws Now Playing at a Theatre Near You (or Coming Soon): Are You Ready?

2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more

[Webinar] Moving Targets While Under Fire – Aligning with New Data Laws While Hackers and Customers Bring Pressure - April 5th,...

In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more

Why is Norton Anti-Virus Becoming a Crypto Mining Botnet?

In the before-times – the heady days of 2017 when the prices of both Bitcoin and Ethereum skyrocketed and seemed immune to gravity – several well-known companies boosted their value by claiming to build new products on the...more

Hacking Is Changing: Should Our Data Security Change?

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Why Data Security and Legal Should Be Friends

Within a corporation, teams jockey for resources and promote their roles within the enterprise. It sometimes seems like important parts of the company are working at cross-purposes....more

Will NeuralHash Make a Hash of Privacy?

Our personal technology is so complex that making a change in one aspect is likely to affect us in many ways. When tech companies step into social issues, we are likely to see unintended consequences....more

Amazon Sidewalk Shares Your Home WiFi with the Neighbors

We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us.  We also know that it records private conversations...more

The Commercial Gap in Digital Security

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

The UK Sets Out to Prove That You Are You

There is a reason we don’t all have a definitive digital identifier. I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more

Why Big Tech Wants Your Body

Your body may be a wonderland or a wasteland, but it is a goldmine of data. Collectors of information have noticed. In our midwinter exploration of the economic and legal foundations of data regulation, we next turn to a...more

ALERT: EU Actively Supports Protectionist Data Localization Policies

Meet the Euro-crats who think that the European Union needs to behave more like Russia and China. More like Nigeria, Kazakhstan, and Indonesia. These leaders are pushing not just to punish U.S. firms for successfully...more

IoT Security Reaches Center Stage in U.S.

How is a refrigerator like a stoplight camera and a delivery drone? Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more

Evolution of Personal Data in U.S. Law

Definitions are important. How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more

Zoom Settles with the FTC on Video Surveillance and Encryption Overstatement

The Federal Trade Commission (“FTC”) conducted an investigation into Zoom Video Communications, Inc.’s (“Zoom”) privacy and security practices and announced a settlement agreement on November 9, 2020. As a part of the...more

How Risky Is Tossing Your Old Servers? Maybe $60,000,000 Fine

We all have them. Old computers sitting around in storage, never to be used again. Broken servers that have passed their prime. Laptops abandoned for their newer, shinier versions. And what do you do with them? If these...more

Will the IoT Revolution Be Secured?

Historians believe we have started a fourth industrial revolution where physical, digital, and biological worlds will merge to form the basis of a new economy. One of the key elements of this transformation is the emergence...more

Finding a Test for Reasonable Security Practices: Embrace Complexity and Specifics

Most people have a warped and deeply unrealistic understanding of data security. There is no such thing as absolute security. For a thing to have value, you must be able to access the value – in effect, to use it. In order...more

New York: Reasonable InfoSec or Not Reasonable InfoSec? That Is The Question.

Last week, the New York State Senate, at the request of the state attorney general, passed the “Stop Hacks and Improve Electronic Data Security Act” (the “Shield” Act). The bill is currently working its way through the New...more

Lawsuit Alert: New State Law Affirmative Duty to Safeguard Personal Data

Now a business that was hacked may be successfully sued under state common law by data subjects whose information was compromised in the crime. For the first time, a state supreme court has held that a company that was...more

First of its Kind: California to Require IoT Device Security Measures

The new California Consumer Privacy Act is not the only California privacy law that companies will have to prepare for in 2019. Beginning on January 1, 2020, California will also require a manufacturer of a “connected device”...more

White House Releases National Cyber Strategy: Five Benefits for American Businesses

“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more

Your Cyber Insurance Policy May Not Cover GDPR Fines and Liabilities

You may be paying for cyber insurance that will not cover the most significant cyber risks faced by your business. Recent studies call into question whether a company can insure against the unprecedented huge fines for...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide