News & Analysis as of

Cyber Threats

Post-market medical devices, cybersecurity, and the U.S. FDA’s growing concerns

by Hogan Lovells on

From insulin pumps and pacemakers to defibrillators, medical devices increasingly rely on wireless and internet connectivity for efficient operations. Unfortunately, these interconnections also leave devices vulnerable to an...more

Chips Ahoy: #Meltdown and #Spectre Implications for Legal Professionals Part I

Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other...more

Meltdown and Spectre Vulnerabilities: New Year, New Cyber Threat

The first week of January 2018 brought disturbing news on the cyber security front – and for once it was not the result of corporate ineptitude or poorly designed software. Actually, it was far worse. Independent security...more

Digital Health Year in Review: 2017 Trends and Looking Ahead to 2018

by McDermott Will & Emery on

Introduction - Throughout 2017, the health care and life science industries experienced a widespread proliferation of digital health innovation that presents challenges to traditional notions of health care delivery and...more

New cybersecurity threats with potential to impact health care industry identified

by Bricker & Eckler LLP on

On January 4, 2018, the National Health Information Sharing and Analysis Center (NH-ISAC) posted an announcement regarding the cybersecurity threats Meltdown and Spectre that were recently identified....more

Cybersecurity & Privacy Predictions For 2018

Orrick of counsel Emily Tabatabai, a founding member of our Cybersecurity & Data Privacy team, recently spoke with Law360 regarding cybersecurity and privacy predictions for 2018. Emily discussed the inherent privacy and...more

FERC Aims to Broaden Cyber Incident Reporting Requirements

by Morgan Lewis on

The proposal follows a Federal Energy Regulatory Commission finding that existing cyber threats to electric utilities are underreported....more

Special Focus: Treasury Report May Provide A Preview Of The Trump Administration’s Insurance Regulatory Agenda

by Carlton Fields on

On October 26, 2017, the U.S. Department of the Treasury has released a report entitled "A Financial System that Creates Economic Opportunities: Asset Management and Insurance" (the “Report”).1 The Report is the third of four...more

December 31, 2017 Deadline for Cybersecurity under DFARS 252.204-7012 Re-Interpreted

The DoD clarifies its expectation for full compliance to protect Controlled Unclassified Information (CUI) residing on Contractor Systems from cyber incidents. A defense contractor’s updated and current System Security...more

Cyber Risk News & Trends - December 2017

Cybersecurity This Month - Continued onslaught of phishing and travel threats - Internet data breaches threaten the usernames and passwords of billions of people, but bad actors find phishing is the most effective way...more

The Numbers Don’t Lie: The SEC Pursues a More Streamlined Enforcement Agenda

One of the most eye-catching items in the recently released 2017 Annual Report of the Enforcement Division of the Securities and Exchange Commission (SEC or the Commission) is the significant decline in enforcement activity...more

White House Announces Vulnerabilities Equities Policy and Process

by Balch & Bingham LLP on

On November 15, 2017, the Trump administration released the Vulnerabilities Equities Policy and Process. This documents describes the process by which U.S. agencies and departments determine whether to disclose or restrict...more

Senate Banking Committee schedules Dec. 5 markup of regulatory reform bill

by Ballard Spahr LLP on

Last week, members of the Senate Banking Committee announced that they had reached bipartisan agreement on “legislative proposals to improve our nation’s financial regulatory framework and promote economic growth.” ...more

Data Privacy + Cybersecurity Insider - November 2017 #3

by Robinson & Cole LLP on

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs. Now, researchers at Cylance have discovered...more

Structured Thoughts: News for the financial services community, Volume 8, Issue 8

Sales of VIX-Linked ETPs – Back to Basics for FINRA - FINRA used a misselling case to remind member firms of certain fundamentals, including the importance of implementing a new product approval process, reasonable...more

Department Of Homeland Security Often Slow To Disseminate Cyber Threat Warnings, According To Government Accountability Office...

by King & Spalding on

On October 30, 2017, the United States Government Accountability Office (“GAO”) issued a report on the Department of Homeland Security’s (“DHS”) risk assessment practices for critical infrastructure. GAO reviewed DHS’s...more

Cybersecurity 2018 – The Year in Preview: Emerging Security Threats

Editors’ Note:  This is the second of a multi-part end-of-year series examining important trends in data privacy and cybersecurity during the coming year. Click here for our previous entry on HIPAA Compliance.  Up next: ...more

Damaging, but Preventable: WannaCry Report Reveals Vital Cyberattack Prevention Practices

by Faegre Baker Daniels on

In May 2017, ransomware known as WannaCry affected computers in organizations around the world, encrypting data and demanding “ransoms” of between $300 and $600, payable in Bitcoin. WannaCry spread through organizations’...more

MoForward 2018

On Thursday, October 26th, Morrison Foerster’s Government Contracts Group held its inaugural MoForward Event at the Tysons Corner Ritz Carlton. The event was a rousing success, reflecting the unique interaction between our...more

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

by McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal...more

Government Warns of Threat Activity Targeting Critical Infrastructure through Third-Party Access

A cloak of secrecy usually covers covert government activities when it comes to the latest cyber threats and intelligence. But in a rare public statement, the U.S. government has warned that hackers are targeting government...more

Investment Services Regulatory Update - October 2017

by Vedder Price on

New Rules, Propsed Rules, Guidance and Alerts - SEC STAFF GUIDANCE AND ALERTS - SEC Staff Extends No-Action Relief on Auditor Independence and the “Loan Provision” - On September 22, 2017, the staff of the SEC’s...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

Avoid the Headlines: Six Initial Steps To Take Today To Improve Your Company's Data Security

Unless you have been living under a rock, you are probably aware that companies are suffering cyber attacks that jeopardize sensitive company or customer data more and more frequently. What you may not know is that even more...more

MoFocus: Our Insights into the Risk + Crisis Landscape - Vol.1 Issue. 2

by Morrison & Foerster LLP on

Arrest of a Chinese National on Hacking Charges Illustrates How U.S. Tactics Are Changing to Meet the New Cyber Threat - In August, Yu Pingan, a Chinese national, was arrested on charges that he conspired to acquire and...more

418 Results
|
View per page
Page: of 17
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.