News & Analysis as of

Cyber Crimes Cybersecurity

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

SEC Enforcement Division Priorities Pertaining to Retail Investors and Cybersecurity

by Dechert LLP on

In a keynote speech to the Securities Enforcement Forum on October 26, 2017, U.S. SEC Division of Enforcement (Division) Co-Director Stephanie Avakian emphasized the protection of retail investors and cybersecurity as...more

Michigan Governor Establishes Cyber Civilian Corp.

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3, which has been in existence for three years, but not statutorily deployed....more

Hilton Settles Data Breach Investigations with NY and VT AGs

Hilton Domestic Operating Co., Inc. (Hilton) has agreed to pay the New York and Vermont Attorneys General $700,000 to settle allegations that they violated those state consumer protection and data breach notification laws...more

Data Privacy + Cybersecurity Insider - November 2017

by Robinson & Cole LLP on

US-CERT Warns of New Ransomware: Bad Rabbit - The U.S. Computer Emergency Readiness Team (US-CERT) is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated it has received multiple...more

US-CERT Warns of New Ransomware: Bad Rabbit

The U.S. Computer Emergency Readiness Team (US-CERT)is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated that it has received multiple reports of infections by Bad Rabbit in countries...more

ALERT: Prepare to be Ransomed: A Primer on Legal Obligations Before and After Ransomware Strikes

by Pullman & Comley, LLC on

According to a recent U.S. Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types. An incredible 51 percent of respondents in a January 2017 study by the Ponemon...more

FERC Proposes New Cybersecurity Rules for Electric Grid

The Federal Energy Regulatory Commission (FERC) has proposed new rules to enhance cybersecurity for the electric grid in the U.S., which includes security management controls to specifically respond to risks associated with...more

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS

The FBI and Department of Homeland Security issued a joint statement on October 20 warning of an increased danger of a malicious “multi-stage intrusion campaign” to critical infrastructure industries, including the energy...more

Data Privacy + Cybersecurity Insider - October 2017 #4

by Robinson & Cole LLP on

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more

Healthcare Cyber: House Inquiry Targets Medical Software

In its latest inquiry into cybersecurity risks in the healthcare sector, the House Energy and Commerce Committee last week requested a “formal briefing” from medical transcription vendor Nuance Communications, Inc. concerning...more

Is Your Business Insured Against A Cyber Attack?

by Partridge Snow & Hahn LLP on

Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more

JAMA: Cybersecurity Concerns and Medical Devices – Lessons from a Pacemaker Advisory

Interesting viewpoints from this Journal of the American Medical Association article on FDA’s August 2017 notice re: cyber security issues with certain pacemakers, including:... ...more

Hyatt Data Breach Impacts 41 Locations in 11 Countries

Hyatt Hotels Corporation recently announced that it had identified malicious software code resulting in unauthorized access to customer payment card information. Hyatt disclosed that upon investigating the incident, it...more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

Happy Cybersecurity Awareness Month! Are you Safe?

by Snell & Wilmer on

Since it was first announced by Presidential Proclamation in 2013, we mark each October as National Cybersecurity Awareness Month. The Department of Homeland Security explains that, in 2017, designation is “designed to engage...more

The CFAA: Shield or Anti-Competitive Sword in the World of Data Scraping?

by Fish & Richardson on

Most people think of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, as the federal criminal statute addressing computer hacking and other cybercrime. But as more and more businesses vest their enterprise value in...more

Legislature Addresses Ransomware Threat With Criminal Penalties

by Murtha Cullina on

It is fitting that on the first day of Cybersecurity Awareness Month, new legislation takes effect regarding one of the most destructive types of malware. In response to the rapidly increasing rate of computer extortion...more

SEC Creates New Units Focused On Cyber Crimes That Will Cover Crypto Tokens

by Reed Smith on

Two months after its Investor Bulletin stating that U.S. securities laws may apply to digital token sales, the Securities Exchange Commission (“SEC”) announced Monday two new initiatives to address cyber-based threats and...more

Privacy Perils: Hackers Breach Instagram User Accounts

by Bass, Berry & Sims PLC on

Engineers at Instagram have revealed that hackers managed to gain access to the contact numbers and email addresses (but not passwords) of some of Instagram's users via a bug in the app's API (Application Programming...more

Not So Entertaining: Cybercrime In The Entertainment Industry

by Jackson Lewis P.C. on

Although certain industries are known targets for cyber attacks – healthcare, financial, government – cyber attacks pose a threat to all sectors. Organizations in the entertainment industry have increasingly become targets of...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

by Mintz Levin on

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

Five Coverage Tips from Recent E-mail Scam Insurance Decisions

by Orrick - Trust Anchor on

The number of decisions considering claims for insurance coverage resulting from Business Email Compromise (“BEC”) scams has been increasing, providing policyholders with some hope, and some clarity, in this muddy area....more

District Courts Buck Trend on Fidelity Coverage for Social Engineering and Business Email Compromise Schemes

by Carlton Fields on

The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more

Avoiding Management Struggles When it Comes to Data Breaches: Part 4

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

392 Results
|
View per page
Page: of 16
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.