News & Analysis as of

Cloud Computing Data Breach Cybersecurity

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Sheppard Mullin Richter & Hampton LLP

Looking Beyond FedRAMP – Lessons from the U.S. Treasury Cybersecurity Incident

In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more

Epiq

Federal Contractors Face Stricter Regulation Over Cyber Incident Response Reporting

Epiq on

Last October, the Federal Acquisition Regulation (FAR) Council proposed two new rules, one of which that will influence cyber incident response practices. The scope is limited as it only applies to federal government...more

Alston & Bird

Chinese Hackers Exploit Gap in Cloud Environment Used by U.S. Government

Alston & Bird on

According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more

Ankura

How to Close the Cybersecurity Skills Gap: Collaboration, Creativity, and Education

Ankura on

The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more

Ankura

Trends and Moments that Defined 2022 & Predictions for 2023

Ankura on

While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more

The Volkov Law Group

Regulatory Implications from 2019 Capital One Hack and Recent Conviction of Former AWS Engineer

The Volkov Law Group on

Paige Thompson, a former Amazon Web Services employee, was recently convicted of seven counts of fraud in U.S. District Court for stealing personal data from more than 100 million customers from unsecured accounts stored on...more

Bilzin Sumberg

Recent Settlements and Penalties Show Perils of Data Breaches

Bilzin Sumberg on

Two major U.S. financial institutions, Morgan Stanley and Capital One, recently agreed to resolve separate class action lawsuits by paying, in the aggregate, hundreds of millions of dollars in compensation for massive data...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Womble Bond Dickinson

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Womble Bond Dickinson on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Proskauer on Privacy

“Log4Shell” Vulnerability Has Potential to Compromise Millions of Devices

Proskauer on Privacy on

Cybersecurity experts around the world are scrambling to sound the alarm about a newly discovered security vulnerability that could be used by attackers to easily infiltrate computer systems. The vulnerability is found in...more

The Volkov Law Group

Cyber Incidents Underscore Absence of Real Private Sector Cybersecurity Standards

The Volkov Law Group on

Sometimes it takes a public event to remind corporate risk managers about the importance of effective risk management.  While corporate risk management functions have become yet another “hot” topic or new-fangled response to...more

Robinson+Cole Data Privacy + Security Insider

Ubiquiti Notifies Customers of Breach

Ubiquiti, a manufacturer of products used for networks such as routers, webcams and mesh networks, announced this week that an unauthorized access to its systems hosted by a third-party cloud provider may have compromised...more

Bricker Graydon LLP

Your data is under attack: Are you ready?

Bricker Graydon LLP on

On July 16, 2020, Blackbaud, a U.S. cloud software company and one of the world’s largest providers of financial and fundraising technology for nonprofit organizations and education institutions, notified its customers of a...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Not shockingly, the White House’s recent insistence on keeping tariffs in place on China (to ensure deal compliance) is proving to be a major stumbling block in negotiations on a grand trade deal between the US and China....more

Morgan Lewis

Navigating the IoT Workplace Quagmire

Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Polsinelli

Privacy and Data Security: 2017 Year in Preview

Polsinelli on

Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more

Robinson+Cole Data Privacy + Security Insider

Forrester Cyber Predictions for 2017: Harsh Reality

Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more

Skadden, Arps, Slate, Meagher & Flom LLP

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

Stinson LLP

HHS Publishes New Guidance on HIPAA and Cloud Computing

Stinson LLP on

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has issued a new guidance regarding HIPAA compliance and the use of cloud computing solutions. The guidance is intended to assist covered entities...more

King & Spalding

The European Union Approves First-Ever Cybersecurity Rules

King & Spalding on

On July 6, 2016, after more than three years of debate, the European Parliament gave final approval to the Network and Information Security Directive. It establishes the first set of fundamental cybersecurity and breach...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Alston & Bird

The Digital Download - Privacy & Data Security Monthly Newsletter - January 2016

Alston & Bird on

Senior Counsel Peter Swire to Debate European Privacy Activist Max Schrems. The debate, set to take place on January 26 in Brussels, will highlight key differences between certain European and U.S. attitudes towards U.S....more

43 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide