News & Analysis as of

Cybersecurity Data Mining

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Integreon

Post-Breach Data Review: 5 Reasons Why You Should Not Go at It Alone

Integreon on

After a data breach, organizations need to understand the scope of the incident in order to quickly resolve it and ensure they are able to meet notification requirements. The urgency often leads to the misguided belief that...more

Integreon

How AI is Reshaping Cyber Insurance

Integreon on

AI emerges as both threat and solution in cyber insurance, reshaping risk assessment and breach response. AI is transforming the work of professionals everywhere. Unfortunately, that includes cybercriminals....more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Mintz

EnforceMintz — Government Scrutiny of Medicare Advantage Organizations Expected to Continue in 2024

Mintz on

Medicare Advantage (also known as Medicare Part C) remains a top enforcement priority as evidenced by False Claims Act (FCA) investigations and litigation involving nearly all large Medicare Advantage Organizations (MAOs). As...more

Jackson Lewis P.C.

Downstream Breaches Cause Headaches for Healthcare Providers, as State AG Seeks Law Change to Require AG Notification

Jackson Lewis P.C. on

For healthcare providers and health systems covered by the privacy and security regulations under the Health Insurance Portability and Accountability Act (HIPAA), a breach of unsecured protected health information (PHI)...more

Association of Certified E-Discovery...

[Webinar] Data Mining 2.0: How WatchtowerAI Transforms Incident Response - December 6th, 1:00 pm - 2:00 pm EST

In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

Jones Day

In Privacy Litigation Over Magazine Subscription, Residency Is a Nonissue - A recent court decision signifies that compliance with...

Jones Day on

On January 16, 2020, a federal judge held that Michigan's Personal Privacy Protection Act applies to nonresidents who are located outside the state. The decision, Lin v. Crain Communications, No. 19-11889 (E.D. Mich. January...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2019 #3

Robinson & Cole LLP on

We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. That reality hit email provider VFEmail...more

Robinson+Cole Data Privacy + Security Insider

Data Mining Shaping The Global Political Climate

The 2016 U.S. Presidential election demonstrated the importance of digital campaigning. President Trump’s campaign was vastly outspent by Hillary Clinton’s campaign, and placed little emphasis on traditional ground-game...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Some reaction to the HQ2 x2 news, including what a pair of new tech hubs actually means for the cities that have thrown out the red carpet to Amazon and other technology giants....more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Foley & Lardner LLP

Sharing and Mining Patient Data in Digital Health and Telemedicine: Laws You Need to Know

Foley & Lardner LLP on

The use of new technologies such as digital health applications, telemedicine, and information exchanges can provide game-changing benefits for providers and patients alike. However, with increased sharing comes increased...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hacking Your Vote From Inside Your Head: How Cambridge Analytica Altered Reality Via Social Media To Induce Specific Voting...

We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more

Orrick, Herrington & Sutcliffe LLP

A New Chapter in the Cybersecurity? Is there a Role for Active Deterrence?

In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide