News & Analysis as of

Authentication Cybersecurity Risk Management

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

Morrison & Foerster LLP - Government...

NIST Releases Revised Cybersecurity Controls And Requirements For Protection Of Controlled Unclassified Information Resident In...

On May 10, 2023, the National Institute of Standards and Technology (“NIST”) released an Initial Public Draft of Revision 3 to NIST Special Publication (“SP”) 800-171, Protecting Controlled Unclassified Information in...more

Farella Braun + Martel LLP

Going it Alone: How to Manage Cybercrime Response With Less Government Help

Several years ago when cybercrime and attacks on corporate information and funds were less common, corporate counsel may have been justified in expecting the government to take a leading role in efforts to identify, locate,...more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

King & Spalding

Imposter Websites Prompt Regulatory Warning to Financial Industry

King & Spalding on

On April 29, 2019, FINRA published an Information Notice alerting to a potential increase in member firms falling victim to imposter websites – websites designed to appear legitimate but that actually serve as a vehicle to...more

Robinson+Cole Data Privacy + Security Insider

Closing The Door Behind Your MFA Implementation

I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more

Robinson+Cole Data Privacy + Security Insider

The Latest Hack into a Smart Home Camera – Another Reason to Use Two Factor Authentication

Sometimes I feel like I’m the Grinch at a party when I talk shop about the latest massive data breach or horrible hacker story that is in the news. We say things like, “it’s not if, but when” there will be another data...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Passwords Are Getting Ridiculous, Right? Consider Simplifying Your Company's Two-Factor Authentication With A Physical Security...

If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more

Hinshaw & Culbertson LLP

Cyber Alert - Dual Factor Authentication Can Be Hacked By Phishing

Risk Management Question: Dual factor authentication greatly increases your online security, but it is no panacea. Dual factor authentication can be compromised through social engineering and phishing exploits. What can law...more

Robinson+Cole Data Privacy + Security Insider

OCR Stresses Importance of Authentication in Newsletter

In a recent newsletter, the Office for Civil Rights (OCR) encourages health care organizations to review their procedures around authentication and “ensure that they have the appropriate safeguards in place.”...more

Sheppard Mullin Richter & Hampton LLP

DoD Reveals its Cybersecurity Discipline Implementation Plan (or How 1940s War Department VD Training Can Help Your 21st Century...

“If our country is to successfully defend our right to live the American way, it needs every one of you, and requires you in the best possible condition. Any [company] who willfully, or through neglect fails to maintain...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide