News & Analysis as of

Cyber Attacks Technology Sector

A&O Shearman

Cyber-attack victim obtains injunction to prevent publication of stolen data

A&O Shearman on

Following a high-profile cyber-attack earlier in the year which impacted the medical data of NHS patients, the English High Court granted Synnovis an interim injunction which prevents the publication of the stolen data. This...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

J.S. Held

Cybercrime vs. Cybersecurity: Learning the Tactics of Criminals to Protect Your Interests

J.S. Held on

Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 5, Issue 4, May 2024

MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more

HaystackID

Ambient Light Sensors to Malware Threats: MIT Unveils Smartphone Privacy Risks Amid Market Turbulence

HaystackID on

Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more

American Conference Institute (ACI)

[Event] 8th Forum on FinTech & Emerging Payment Systems - April 9th - 10th, New York, NY

ACI’s 8th Annual Legal, Regulatory, and Compliance Forum on Fintech & Emerging Payment Systems will provide in-depth guidance on the latest regulatory developments at the Federal and State Level that you need to be aware of....more

Fenwick & West LLP

Opportunities Abound in New National Defense Authorization Act

Fenwick & West LLP on

The Fiscal Year 2024 National Defense Authorization Act (“FY2024 NDAA”) continues the national security imperative to enhance the country’s scientific and technological developments and to adopt emerging technologies and...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 10, December 2023

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data? As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?", we are addressing the...more

DRI

Deepfakes: Navigating Data Privacy and Cybersecurity Risks

DRI on

Since 2017, deepfakes have proliferated all over the internet. Deepfakes (also styled as deep fakes) are synthetic media created with artificial intelligence (AI) technology that utilize machine learning algorithms like...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Pillsbury - Internet & Social Media Law Blog

News of Note for the Internet-Minded (8/30/23) – Ransomware, Quantum Attacks and a New LLM

In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the...more

Bradley Arant Boult Cummings LLP

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 5, May 2023

Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more

Polsinelli

Guidance for the ‘Burden of Cybersecurity Compliance’ Emerges

Polsinelli on

Two months ago, the White House released its National Cybersecurity Strategy.  Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors.  For example, the...more

A&O Shearman

The opportunities and legal risks of quantum computing

A&O Shearman on

Real progress has been made in making quantum computing a reality. How does it work, what are its potential applications, and how might quantum inventions be protected?...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

Ankura

The 80/20 Rule in MDR: People, Not Technology, Catch the Biggest Threats

Ankura on

While Managed Detection and Response (MDR) takes advantage of the latest technology, it is important to recognize that humans are still the best at making the complex, nuanced decisions that are sometimes necessary in...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 3, March 2023

Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics - “Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more

Littler

Brazilian National Data Protection Agency (ANPD) Discloses List of Companies Being Investigated

Littler on

In the wake of the Brazilian National Data Protection Agency (ANPD) issuing further regulations on the determination of penalties for violations of the Data Protection Law (LGPD), on March 23, 2023 the ANPD launched a new...more

American Conference Institute (ACI)

[Event] 7th Annual Legal, Regulatory and Compliance Forum on FinTech & Emerging Payment Systems - April 18th - 19th, New York, NY

Join American Conference Institute at the 7th Annual Legal, Regulatory and Compliance Forum on FinTech & Emerging Payment Systems on April 18-19, 2023, in New York! Gain key insights into the hurdles arising amid...more

Bradley Arant Boult Cummings LLP

How Not to Make a Deal: 5 Key Cybersecurity Concerns in M&A

Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Volume 3, Issue 12

Universities Share Lessons Learned from Ransomware Attacks "According to a recent Sophos poll of IT professionals, 44 percent of educational institutions suffered ransomware attacks in 2020, and 58 percent of those hit...more

Bradley Arant Boult Cummings LLP

Cyber Defense: Erin Illman on the 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack

Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North...more

60 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide