News & Analysis as of

Cybersecurity Framework Risk Management Hackers

Robinson+Cole Data Privacy + Security Insider

Public Urged to Encrypt Mobile Phone Messaging and Calls

On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide...more

Baker Donelson

Happy Hack-tober! Don't be Scared: How to Protect Your Business from RaaS Threats

Baker Donelson on

October is here, and as we prepare for pumpkin spice lattes, fall sweaters, and scary decorations, there's one thing your business can't afford to ignore this month: cybersecurity. Welcome to Hack-tober, or as it's officially...more

Pillsbury - Policyholder Pulse blog

Insuring a King’s Ransom: The Role of Cyber Insurance in Ransomware Risk Management

Nearly 700 years ago, England captured King John II of France and held him for ransom for four million écus. But France could not afford to pay, and King John II ultimately traded his two sons as substitute hostages to try...more

Robinson+Cole Data Privacy + Security Insider

Ohio Passes Law Providing Safe Harbor for Businesses Suffering Data Breach

The Ohio legislature recently passed S.B. 220, which gives businesses that suffer a data breach an affirmative defense against tort claims brought in class action suits....more

Womble Bond Dickinson

NIST Cybersecurity Framework 1.1: A blueprint for compliance and assurance

Womble Bond Dickinson on

In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018

Robinson & Cole LLP on

According to bloggers on techtarget.com, security risks around the internet of things (IoT) continue to be problematic, and a new free guide, “The Developer’s Guide to IoT” has been published specifically for IoT device...more

Burr & Forman

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Pillsbury Winthrop Shaw Pittman LLP

Executive Order on Cybersecurity: Considerations for Business - A fuller picture emerges on how the Trump Administration’s first...

On May 11th, in the wake of a series of wide-ranging cyber breaches and attacks plaguing public and private sectors alike, President Trump signed a long-awaited Executive Order on Strengthening the Cybersecurity of Federal...more

Sheppard Mullin Richter & Hampton LLP

Presidential Executive Order on Cybersecurity: No More Antiquated IT

On May 11, President Donald Trump issued his long-awaited Executive Order on cybersecurity, the ‘‘Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.’’ It had been...more

Snell & Wilmer

FTC Round-Up: NIST Framework Compliance Is Not Enough and Looming Ransomware Enforcement Activity

Snell & Wilmer on

On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide