News & Analysis as of

Authentication Cybersecurity

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

Lerman Senter PLLC

All Providers Must Submit Expanded Filing in Robocall Mitigation Database by February 26, 2024

Lerman Senter PLLC on

The Federal Communications Commission has set a February 26, 2024 filing deadline for all providers in the call chain, regardless of STIR/SHAKEN status or whether they have the facilities to implement STIR/SHAKEN, to file...more

Davis Wright Tremaine LLP

Project W: Web 2.5 – The Companies That Are Using the Blockchain To Innovate and Solve Big Problems

Saying the word "crypto" will get a visceral reaction in many circles, and if you say you still believe in the future of crypto, you have a high likelihood of being blacklisted.   I get it. It has been a tumultuous 16...more

Morrison & Foerster LLP - Government...

NIST Releases Revised Cybersecurity Controls And Requirements For Protection Of Controlled Unclassified Information Resident In...

On May 10, 2023, the National Institute of Standards and Technology (“NIST”) released an Initial Public Draft of Revision 3 to NIST Special Publication (“SP”) 800-171, Protecting Controlled Unclassified Information in...more

Bracewell LLP

FINRA Facts and Trends - September 2022

Bracewell LLP on

Welcome to the latest issue of Bracewell’s FINRA Facts and Trends, a monthly newsletter devoted to condensing and digesting recent FINRA developments in the areas of enforcement, regulation and dispute resolution. This...more

Wiley Rein LLP

FTC Uses Enforcement Proceeding to Send Message on Account Security Practices

Wiley Rein LLP on

Account security and digital identity have been hot topics for regulators and at the National Institute of Standards and Technology (NIST). The government has been promoting multifactor authentication (MFA) and innovation in...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 3, Issue 7

Britain Announces Plans to Mint Its Own NFT as It Looks to ‘Lead the Way’ in Crypto - "Glen said the government was also 'widening' its gaze to look at other aspects of crypto, including so-called Web3, a movement that...more

Clark Hill PLC

Biometric Authentication: The Good, the Bad, and the Ugly

Clark Hill PLC on

TV and movies introduced biometric identification as a futuristic concept ages ago. Security on Star Trek was cutting edge with voice ID making sure the right personnel were in command of the Enterprise. Facial recognition,...more

Troutman Pepper Locke

NY DFS Releases Guidance on Multi-Factor Authentication

Troutman Pepper Locke on

On December 7, 2021, the New York Department of Financial Services (“NY DFS”) released an industry letter providing guidance on Multi-Factor Authentication (“MFA”). MFA, which requires users of information systems to...more

Morrison & Foerster LLP

FFIEC Issues Updated Guidance On Authentication And Access To Financial Institution Services And Systems

On August 11, 2021, the Federal Financial Institutions Examination Council (FFIEC) issued new guidance, titled “Authentication and Access to Financial Institution Services and Systems” (“Guidance”), which provides examples of...more

Farrell Fritz, P.C.

The Invaluable Benefits Of Multi-Factor Authentication

Farrell Fritz, P.C. on

The need to input a username and password when logging into a computer is a “single factor” authentication. But, from a security perspective, that single factor authentication only goes so far. Consider, for example, the...more

Holland & Knight LLP

Gmail to Use Verified Trademark Logo Badges to Combat Email Scammers

Holland & Knight LLP on

In the face of the ever-growing threat of cyberattacks disguised in emails from phishers, impostors and other increasingly sophisticated security scammers, Google has launched a tool to allow organizations to fight back by...more

Cozen O'Connor

Massachusetts AG Urges Entities To Act Now On Ransomware Threat

Cozen O'Connor on

Massachusetts AG Maura Healey released a statement urging Massachusetts businesses and government entities, including law enforcement, to immediately assess existing data security practices and take appropriate steps to...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Levenfeld Pearlstein, LLC

How To Better Protect Your Business From Cyberattacks

Bloomberg Law recently reported that Goodwin Procter was the latest law firm to fall victim to a data breach after one of its vendors was hacked. Cyberattacks on law firms and businesses have become increasingly common over...more

Jones Day

Strong Customer Authentication in the United States: When, Not If

Jones Day on

The Situation: Although the deadline keeps getting extended, e-commerce merchants and payment processors across the European Union are racing to implement the strong customer authentication ("SCA") requirements of the Revised...more

Farella Braun + Martel LLP

Going it Alone: How to Manage Cybercrime Response With Less Government Help

Several years ago when cybercrime and attacks on corporate information and funds were less common, corporate counsel may have been justified in expecting the government to take a leading role in efforts to identify, locate,...more

Bass, Berry & Sims PLC

Privacy Perils: Refresher Course in Good Password Hygiene, Part 1

Bass, Berry & Sims PLC on

To prepare for and in honor of National Change Your Password Day (NCYPD) on February 1, we are providing a refresher course in good password hygiene. (Look back at prior Privacy Perils.) NCYPD is only one of at least three...more

Ballard Spahr LLP

FinCEN Director Blanco Addresses “Cyber Hygiene”

Ballard Spahr LLP on

FinCEN Director Kenneth A. Blanco delivered prepared remarks on September 24 at the 2019 Federal Identity (FedID) Forum and Exposition in Tampa, Florida. Director Blanco summarized the topics of his remarks by stating the...more

A&O Shearman

European Banking Authority Publishes Opinion on Strong Customer Authentication Under Payment Services Directive

A&O Shearman on

The European Banking Authority has published an Opinion on market approaches to payment authentication that will be deemed compliant with the new rules on strong customer authentication coming into force later this year....more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

King & Spalding

Imposter Websites Prompt Regulatory Warning to Financial Industry

King & Spalding on

On April 29, 2019, FINRA published an Information Notice alerting to a potential increase in member firms falling victim to imposter websites – websites designed to appear legitimate but that actually serve as a vehicle to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2019 #3

Robinson & Cole LLP on

The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange...more

Robinson+Cole Data Privacy + Security Insider

Closing The Door Behind Your MFA Implementation

I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more

49 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide