News & Analysis as of

Cyber Attacks Vendors Data Breach

Mintz

Patch, Investigate, and Defend: Critical and High Vulnerabilities in Cleo Managed File Transfer Solutions Reportedly Under Attack

Mintz on

There is news coming from the U.S. cyber community for organizations that use Cleo’s software products: if your organization or your vendors use Cleo’s Cleo Harmony, VLTrader, or LexiCom products, you may be at heightened...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

Guidepost Solutions LLC

Defending Your Law Firm Against Cyber Threats

In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

Array

Cybersecurity and eDiscovery: What you need to know about your vendor

Array on

Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more

BakerHostetler

[Podcast] 2022 DSIR Report Deeper Dive: Vendor Incidents

BakerHostetler on

The Data Security Incident Response Report features insights and metrics from 1,270+ incidents that members of the firm’s DADM Practice Group helped clients manage in 2021. This episode takes us deeper into vendor...more

NAVEX

Third-Party Breaches Highlight Importance of Managing Risk

NAVEX on

Recent incidents of cyberattacks impacting major organizations through exploited weaknesses in third-party relationships have highlighted the importance of holistic third-party risk management, creating an opportunity to...more

Mitratech Holdings, Inc

Vendor Risk Roundup: 3 Huge Breaches (So Far!) This Year

Wherever you look, it feels like cyberattacks are becoming increasingly common. Criminal hackers are making the headlines every day, stealing the personal information of millions of people, ranging from birthdays to Social...more

Levenfeld Pearlstein, LLC

How To Better Protect Your Business From Cyberattacks

Bloomberg Law recently reported that Goodwin Procter was the latest law firm to fall victim to a data breach after one of its vendors was hacked. Cyberattacks on law firms and businesses have become increasingly common over...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Insured Losses Estimated at $90 Million

The fallout from the SolarWinds hacking incident linked to Russian threat actors has not only wreaked havoc on governmental agencies and private companies whose data are at risk following the incident, but this week, Bitsight...more

Carlton Fields

Ledgers and Law: Real-World Planning for Cyber Attacks

Carlton Fields on

The COVID-19 pandemic has changed the way millions of people work. Remote workers are especially vulnerable to cyber threats such as ransomware and business email compromise. Joe Swanson, chair of Carlton Fields’...more

Robinson+Cole Data Privacy + Security Insider

Tyler Technologies Victim of Cyber-Attack

As one of the largest information technology service providers to local governments, the cyber-attack on Tyler Technologies (Tyler) in Plano, Texas is a sobering reminder of how a cyber-attack on a third-party vendor can put...more

Robinson+Cole Data Privacy + Security Insider

Fall-Out from Blackbaud Ransomware Attack

As a follow-up to last week’s post on the importance of due diligence regarding high-risk vendors’ security practices, Blackbaud, a global company providing financial and fundraising technology to not-for-profit entities,...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Sheppard Mullin Richter & Hampton LLP

SEC To Focus on Cybersecurity in 2019

For the fourth year running, the Securities and Exchange Commission’s Office continues to list cybersecurity as one of the top enforcement priorities for 2019. As it relates to cybersecurity, the SEC will be focusing on...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more

Bass, Berry & Sims PLC

Privacy Perils: Ignorance is Not Bliss

Bass, Berry & Sims PLC on

After several years of cyberattacks, you may be lulled into thinking large, sophisticated companies have now employed adequate safeguards to prevent disclosure of your confidential information. Don’t be so sure. Earlier this...more

Womble Bond Dickinson

Response Options For Businesses With Sensitive Data Breaches

Womble Bond Dickinson on

Your heart raced when the caller on the phone identified himself as an FBI agent. But the conversation was matter-of-fact. About 2,500 sets of credit card information from your clients had been posted for sale on a...more

Akin Gump Strauss Hauer & Feld LLP

Cyber FICO Ratings Could Benefit Insurance Underwriting in Multiple Ways

Nearly 30 years ago the Fair Isaac Corporation (“FICO”) first introduced its metric for measuring creditworthiness. Since then, the FICO Score has become a default metric used by countless market participants to facilitate...more

Patterson Belknap Webb & Tyler LLP

Healthcare Cyber: House Inquiry Targets Medical Software

In its latest inquiry into cybersecurity risks in the healthcare sector, the House Energy and Commerce Committee last week requested a “formal briefing” from medical transcription vendor Nuance Communications, Inc. concerning...more

Patterson Belknap Webb & Tyler LLP

DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman

This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk...more

Mintz - Privacy & Cybersecurity Viewpoints

To Protect Data: Keep Your Network Access Close, and Your Vendors Closer

Two recent data breach incidents in the healthcare industry prove what readers of this blog have heard all too often: KNOW THY VENDORS....more

Perkins Coie

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Perkins Coie on

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

26 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide