News & Analysis as of

Science, Computers & Technology Privacy Military

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

DoD Issues Guidance for Compliance with Cybersecurity Regulations

by Holland & Knight LLP on

• In recently released guidance, the U.S. Department of Defense (DoD) confirms a "one size does not fit all" approach to contractor compliance with its cybersecurity clauses that cover the safeguarding of contractor networks,...more

DoD Contractor’s DFARS Cybersecurity Deadline

At this time last year, the Department of Defense issued a Defense Federal Acquisition Regulation Supplement (DFARS) intended to better protect controlled data and national security networks from cybersecurity threats....more

Protection of servicemembers, Equifax data breach provide mistaken justifications for CFPB arbitration rule

by Ballard Spahr LLP on

In a mistaken attempt to justify the CFPB’s arbitration rule, supporters are pointing to the need to protect the rights of military servicemembers and the recent Equifax data breach. On September 20, Democratic Senator Jack...more

Navy Investigating Whether Ship Collision Resulted from Cyber-Attack

The United States Navy is investigating whether the recent collision of the USS John S. McCain with a Liberian tanker off Singapore may have been caused by a cyber-attack....more

U.S. Army Issues Memorandum Banning Use of DJI Products Due to Cybersecurity Issues

Last week, the U.S. Army issued a memorandum discontinuing the use of DJI drone products due to cybersecurity concerns. The memorandum said, “Due to increased awareness of cyber vulnerabilities associated with DJI products,...more

Presidential Executive Order on Cybersecurity: No More Antiquated IT

On May 11, President Donald Trump issued his long-awaited Executive Order on cybersecurity, the ‘‘Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.’’ It had been...more

Trump Executive Order Addresses Executive Branch, Critical Infrastructure Cybersecurity

by Dechert LLP on

President Donald J. Trump issued an Executive Order on May 11, 2017 aimed at “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” (the “Order”). The Order mandates federal governmental review of...more

NISPOM Change 2 Deadlines Coming for Cleared Contractors

by Hogan Lovells on

As industry comes up on the one-year anniversary of the publication of Change 2 to the National Industrial Security Program Operating Manual (NISPOM)1, a number of implementation deadlines are drawing near. This blog post...more

White House Signs New Cybersecurity Executive Order

by Dentons on

On May 11, 2017, President Donald Trump signed a new Executive Order on cybersecurity entitled Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The new order is split up into three sections,...more

Insider Threat Program Awareness Training Deadline - Cybersecurity and Privacy Team Alert

In May 2016, the Under Secretary of Defense for Intelligence issued a requirement for cleared government contractors to establish an “insider threat program” (ITP) to better protect national security networks from...more

FAA Publishes Notice to Airman Restricting UAS Flights Over 133 Military Facilities

On April 7, 2017, the Federal Aviation Administration (FAA) published a Notice to Airmen (Notice) that becomes effective on April 14, 2017. The Notice prohibits the operation of unmanned aircraft systems (UAS) over 133...more

Top cybersecurity developments in 2017 for ADG companies

by Hogan Lovells on

While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more

DOD U.S.-CERT Cybersecurity Incident Reporting for Defense Contractors Effective April 1, 2017

New U.S. Computer Emergency Readiness Team (U.S.-Cert) guidelines around incident reporting went into effect this week (April 1, 2017). The guidelines require all federal departments and agencies, state, local, tribal and...more

Air Force Security Clearance Files Compromised on Unsecured Backup Drive

Security researchers have discovered that an unsecured backup drive has compromised thousands of U.S. Air Force documents, including personnel files and sensitive forms filled out by senior and high-ranking officials. These...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

U.S. Military Special Operations Command Workers’ Data Exposed by Vendor

Military personnel continue to be victimized by data breaches. This time, the personal information of healthcare workers employed by Potomac Healthcare Solutions (Potomac), who work for a U.S. Special Operations Command were...more

U.S. Navy Announces Breach of 134,386 Sailors’ Information from Laptop of Vendor

The U.S. Navy has revealed that it has been notified by one of its vendors that a laptop of the contractor was the source of a data breach that compromised the names and Social Security numbers of 134,386 current and former...more

DFARS and DIB: Compliance Steps for DoD’s Newly Finalized Cybersecurity Rules for Contractors

by Orrick - Trust Anchor on

For businesses that work with the U.S. Department of Defense (“DoD”), two important rules for safeguarding certain categories of sensitive information and reporting cyber incidents were recently finalized, updating the...more

DoD Finalizes Cybersecurity and Cloud Computing Rule

by Holland & Knight LLP on

On October 21, 2016, the Department of Defense (DoD) issued a final rule following-up on the interim rules it had issued on August 26 and December 30, 2015, regarding safeguarding contractor networks and purchasing cloud...more

DOJ Charges Defense Contractor with Removal and Retention of Classified Materials

The Department of Justice (DOJ) yesterday announced that it has charged a Maryland man, Harold Thomas Martin III with theft of government property and unauthorized removal and retention of classified materials by a government...more

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

FAR Information System Security Standards Rules Finalized

by Holland & Knight LLP on

The U.S. federal government announced on May 16, 2016, new Federal Acquisition Regulation (FAR) rules that set high-level standards for the basic safeguarding of contractor information systems that process, store or transmit...more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

FBI’s cyber most wanted: Spotlight on Firas Dardar and Ahmed Agha

New additions to the FBI’s Cyber’s Most Wanted List show “the line between ordinary criminal hackers and potential national security threats is increasingly blurry,” according to Assistant Attorney General for National...more

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

61 Results
|
View per page
Page: of 3
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.