News & Analysis as of

Cyber Attacks Cybersecurity Framework Hackers

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2023 - #2

Robinson & Cole LLP on

CYBERSECURITY - Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP - Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more

Lowndes

President Biden’s Cybersecurity Order Takes Security Seriously

Lowndes on

On May 12, President Biden issued Executive Order 14028 focused on improving the nation’s cybersecurity posture. The order follows the recent cyberattack on one of the nation’s largest pipelines, Colonial Pipeline, in which...more

Robinson+Cole Data Privacy + Security Insider

Ohio Passes Law Providing Safe Harbor for Businesses Suffering Data Breach

The Ohio legislature recently passed S.B. 220, which gives businesses that suffer a data breach an affirmative defense against tort claims brought in class action suits....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2018

Robinson & Cole LLP on

We reported last week that a spyware maker recently compromised users’ and victims’ sensitive information. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its...more

Womble Bond Dickinson

NIST Cybersecurity Framework 1.1: A blueprint for compliance and assurance

Womble Bond Dickinson on

In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more

Burr & Forman

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Mintz - Privacy & Cybersecurity Viewpoints

#MLWashingtonCyberWatch: The Cybersecurity Executive Order (at last)

Amid the flurry following former FBI Director James Comey’s firing last week, President Trump marked his 111th day in office on Thursday, May 11th by signing an executive order targeting national cybersecurity....more

Snell & Wilmer

FTC Round-Up: NIST Framework Compliance Is Not Enough and Looming Ransomware Enforcement Activity

Snell & Wilmer on

On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more

Robinson+Cole Data Privacy + Security Insider

Raytheon/Ponemon survey confirms companies wait until an event to hire a data security vendor

The results of a Raytheon commissioned Ponemon study released on June 7, 2016 shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to...more

King & Spalding

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

King & Spalding on

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

King & Spalding

Disclosure Of Numerous Hacks At The U.S. Department Of Energy Renews Cybersecurity Concerns In The Energy Sector

King & Spalding on

Records produced by the U.S. Department of Energy (“DOE”) to USA TODAY under a Freedom of Information Act request revealed over 150 successful cyber intrusions into DOE computer systems between 2010 and 2014. Concerns about...more

Ballard Spahr LLP

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

Ballard Spahr LLP on

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Bilzin Sumberg

The Legal Lessons of Data Breaches

Bilzin Sumberg on

Every business would love to find a fortune teller to give it insight into what trends to follow, which risks to take, and when “exposure” will convert to liability. Some clients might say that, unfortunately, their lawyers...more

Locke Lord LLP

Solving the Legal Challenges of Trustworthy Online Identity

Locke Lord LLP on

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide