News & Analysis as of

Cybersecurity Bad Actors

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Jackson Lewis P.C.

Multi-factor Authentication (MFA) Bypassed to Permit Data Breach

Jackson Lewis P.C. on

As organizations continue to take steps to prevent cyberattacks, a near-universal recommendation is that they should implement multi-factor authentication (MFA), and for good reason. Organizations subject to the updated FTC...more

Ankura

U.S. Department of Commerce Issues Proposed Rule Impacting AI and U.S. IaaS Providers to Counter Foreign Malicious Actors

Ankura on

On January 29, 2024, the Bureau of Industry and Security (BIS) at the U.S. Department of Commerce issued a new proposed regulatory rule (the “Proposed Rule”), which will impose significant diligence, monitoring, and reporting...more

Cozen O'Connor

23andme Is Asked to Confirm if Data Security Is Part of Its DNA

Cozen O'Connor on

Connecticut AG William Tong sent an inquiry letter to 23andMe, Inc. asking the genetic testing and ancestry company for more information regarding an October 6th press release in which it disclosed that customer profile...more

Mitratech Holdings, Inc

Aligning your cyber risk management program with your company’s bottom line

The key to gaining buy-in for your cyber risk roadmap under tightening budgets and staffing challenges. This statement should come as no surprise: there’s been an alarming rise in the number and sophistication of cyber...more

Constangy, Brooks, Smith & Prophete, LLP

Cyber AI Chronicles II – AI-enabled cyber threats and defensive measures

Recent developments in Artificial Intelligence have opened the door to exciting possibilities for innovation. From helping doctors communicate better with their patients to drafting a travel itinerary as you explore new...more

StoneTurn

Tips to Avoid the Common Fraudster: Lessons from Corporate Investigations

StoneTurn on

With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more

Levenfeld Pearlstein, LLC

Two Fundamental Shifts in the New “National Cybersecurity Strategy”

In March 2023, the Office of the National Cyber Director released the public version of the National Cybersecurity Strategy, which provides strategic guidance for how the U.S. should protect internet users from cyberattacks...more

Spilman Thomas & Battle, PLLC

Cyberattacks and Construction – A Hard Hit Industry

When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks....more

Fox Rothschild LLP

The Impact of Recession on Cybersecurity Programs – Beware of the trap game.

Fox Rothschild LLP on

There’s no mistake, we’re in a recessionary cycle. We can stay out of the politics and debate related to predicting the exact cause, effect, size, and timeline of the recession. Debate or no debate, we’re already seeing...more

K2 Integrity

The North Korean Crypto Threat

K2 Integrity on

Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

Bad Actors Continue to Exploit Log4Shell Vulnerabilities

Takeaway: CISA and CGYBER recommend all organizations who did not immediately apply available patches to assume Log4Shell compromise and initiate threat hunting activities. In December 2021, the world was held hostage by...more

Wiley Rein LLP

Court Holds Social Engineering Fraud Does Not Trigger Computer Fraud Coverage

Wiley Rein LLP on

The United States District Court for the District of Minnesota, applying Minnesota law, has held that an insured’s loss resulting from the insured’s payment of fraudulent invoices received from a bad actor who hacked into the...more

HaystackID

[Webcast Transcript] CFIUS Compliance: Your Approach May Be A Matter of National Security

HaystackID on

Editor’s Note: On July 27, 2022, HaystackID shared an educational webcast on the topic of Committee on Foreign Investment in the United States (CFIUS) compliance. CFIUS is a U.S. government interagency committee with the...more

Wiley Rein LLP

Cleared Defense Contractors at Risk from Russian Cyber Activity; Advisory Shows Government Expectations

Wiley Rein LLP on

What: Cleared Defense Contractors (CDCs) are being actively targeted by Russian state-sponsored cyber activity, according to a Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI), National Security...more

Wiley Rein LLP

2022 Cyber Watch List: A look at 2021 and What’s to Come in the Year Ahead

Wiley Rein LLP on

Privacy In Focus®- In 2021, cyber gained prominence as a top business risk and national security concern with ransomware attacks wreaking havoc on business operations and critical infrastructure. Companies large and small,...more

Fisher Phillips

Federal Authorities Warn Employers Against Ransomware Payouts and Offer New Guidance on Preventing and Responding to Cyberattacks

Fisher Phillips on

Federal officials have recently warned employers and businesses that they could have insult added to injury if they respond to cyberattacks by making ransomware payments – increasingly requested through cryptocurrency – as...more

Society of Corporate Compliance and Ethics...

Jenny Radcliffe on People Hacking

Liverpool-based Jenny Radcliffe, who leads Human Factor Security, is not your typical hacker, clad in a black hoodie and working out of basement. Rather than spending her time hunched over a keyboard, she seeks to hack...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Sheppard Mullin Richter & Hampton LLP

SEC Issues $1 Million Identity Theft Rule Fine

The Securities and Exchange Commission recently settled with Voya Financial Advisors, Inc. for alleged violation of Regulation S-ID (otherwise known as the Identity Theft Red Flags Rule) and Regulation S-P (otherwise known as...more

Akin Gump Strauss Hauer & Feld LLP

Investment Management Special Report - 2017-18 Compliance Developments & Calendar for Private Fund Advisers

Introduction - Despite an anticipated de-regulatory push, there are significant new regulatory concerns for investment advisers to address in connection with their annual review of their compliance manuals. ...more

Morrison & Foerster LLP - JOBS Act

SEC Chair Speaks at the Center for Capital Markets Competitiveness

On Tuesday, July 25, 2017, SEC Chairman Jay Clayton spoke at the U.S. Chamber of Commerce Center for Capital Markets Competitiveness (CCMC). During the panel, Chairman Clayton discussed the Commission’s priorities on a...more

Foley Hoag LLP

Important Dates and Reminders for Investment Advisers, Exempt Reporting Advisers, Commodity Trading Advisors and Commodity Pool...

Foley Hoag LLP on

Investment Advisers - Annual Compliance Reviews - All investment advisers registered with the Securities and Exchange Commission (“SEC”) or The Commonwealth of Massachusetts are required to review their compliance...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide