News & Analysis as of

Cyber Threats Data Security Data Protection

Kaufman & Canoles

[Event] 41st Annual Employment Law Update - May 15th, Hampton, VA

Kaufman & Canoles on

Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more

Robinson+Cole Data Privacy + Security Insider

Joint Alert Warns of Medusa Ransomware

On March 12, 2025, a joint cybersecurity advisory was issued by the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center to advise...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #436 – Microsoft Warns of Crypto Wallet Scanning Malware StilachiRAT

A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more

Guidepost Solutions LLC

Top Security Challenges Facing Data Centers in 2025 and Beyond

It is without question that data centers will continue to play a central role in powering the digital economy, housing critical data, and enabling cloud services, AI, IoT, and other emerging technologies. However, as the...more

Alston & Bird

Emergence of Medusa Ransomware

Alston & Bird on

On March 12, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued a...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Ankura

The Transformative Role of Artificial Intelligence in Cybersecurity

Ankura on

AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more

Frost Brown Todd

Why Privacy Matters to Your Business and What's in Store for 2025

Frost Brown Todd on

Take a deep dive into data privacy and why privacy matters to your business, and what’s in store for 2025. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #429 – Threat Actors Continue to Use QR Codes for Fraudulent Purposes

We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more

Paul Hastings LLP

HHS OCR Releases Proposed Updates to HIPAA Security Rule

Paul Hastings LLP on

On December 27, 2024, the U.S. Department of Health and Human Services (HHS), through the Office for Civil Rights (OCR), announced a Notice of Proposed Rulemaking (NPRM) to amend the Security Standards for the Protection of...more

Constangy, Brooks, Smith & Prophete, LLP

Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025

Happy New Year! As we kick off 2025, now is the perfect time to commit to making changes that benefit your organization, like better protecting your sensitive data. In this episode of Constangy Clips, Cyber Team vice chair...more

NAVEX

Top 10 Trends Sneak Peek: AI, Risk Assessments and Cyber Threats

NAVEX on

On January 29, NAVEX is hosting the Top 10 Trends in Risk and Compliance webinar. This post is a preview of two of the topics covered in the eBook and webinar: the rise of AI and the continued focus on cybersecurity and...more

American Conference Institute (ACI)

[Event] 2nd National Conference on Cybersecurity Law & Compliance - January 29th - 30th, Arlington, VA

Cyberattacks are affecting every company and sector. Meanwhile, the regulatory landscape is intensifying as the SEC continues to enforce the cyber-risk management disclosure rules. Every day presents a new compliance and...more

Fisher Phillips

PEOs Need to Prepare for Increased Cybersecurity Requirements Thanks to Proposed HIPAA Security Rule Revisions

Fisher Phillips on

With the HIPAA Security Rule set to undergo a massive overhaul to boost cybersecurity protections, PEOs need to take note. After all, as stewards of worksite employee and client company data – and as sponsors of group health...more

Blake, Cassels & Graydon LLP

Décodage des défis de cybersécurité : Perspectives et pratiques exemplaires

Les cybermenaces se multiplient et évoluent sans cesse, ce qui oblige les organisations à maintenir leur résilience opérationnelle et à protéger leurs actifs clés, comme leurs infrastructures critiques et leurs données...more

Fisher Phillips

Proposed Updates to HIPAA Security Rule Would Require Entities to Adopt Enhanced Cybersecurity Measures

Fisher Phillips on

The HIPAA Security Rule may soon undergo a big overhaul that would better defend healthcare data from cybersecurity threats – and require much more from covered entities when it comes to establishing and maintaining defenses....more

K2 Integrity

Don’t Let Cyber Scams Ruin the Holidays: Keep the Holiday Season Festive for Your Organization

K2 Integrity on

“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more

Blake, Cassels & Graydon LLP

Cybersecurity Challenges Decoded: Insights and Best Practices

Cybersecurity threats continue to grow and evolve, increasing pressure on organizations to maintain operational resilience and protect their key assets, such as critical infrastructure and sensitive data. As cyberattacks...more

BakerHostetler

[Podcast] Cyber Threats Facing the Gaming Industry and How to Protect Yourself

BakerHostetler on

Counsel Ben Wanger discusses the 2024 Global Gaming Expo with Heath Renfroe from Fenix24 and Alexandra Bretschneider from Johnson Kendall Johnson....more

Integreon

On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response

Integreon on

Cyber breach costs are skyrocketing, and it is crucial for both insureds and insurers to stay on top of cyber incident response. ?? Ensure your incident response plan is robust ?? Avoid the volatile costs of dealing with...more

Robinson+Cole Data Privacy + Security Insider

Public Urged to Encrypt Mobile Phone Messaging and Calls

On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide...more

Vinson & Elkins LLP

[Webinar] Cybersecurity for the C-Suite - December 5th, 12:00 pm - 1:00 pm CT

Vinson & Elkins LLP on

Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more

Alston & Bird

CISA, FBI, NSA, and International Partners Issue Joint Cybersecurity Advisory for Top Routinely Exploited Vulnerabilities in 2023

Alston & Bird on

On November 12, 2024, the Cybersecurity and Infrastructure Security Agency (“CISA”), the Federal Bureau of Investigation (“FBI”), National Security Agency (“NSA”) and certain international partners (including the Australian...more

Robinson+Cole Data Privacy + Security Insider

Joint Advisory Lists Top Routinely Exploited Vulnerabilities

On November 12, 2024, the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency, along with its security partners in Australia, Canada, New Zealand, and the...more

Robinson+Cole Data Privacy + Security Insider

The Impact of Stolen Credentials

This week, Schneider Electric confirmed that it is investigating a security incident involving its JIRA internal development platform. The attacker group, “Grep,” allege that it stole 40 GB of data from the JIRA platform by...more

462 Results
 / 
View per page
Page: of 19

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide