News & Analysis as of

Cybersecurity Data Security

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

BakerHostetler

DSIR: Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects, analyzes and compares key metrics on the incident response matters we handled in the prior year. The Data Security Incident Response (DSIR) Report presents key findings and trends, along...more

Robinson+Cole Data Privacy + Security Insider

FTC Order with GoDaddy Finalized Over Lax Data Security

On May 21, 2025, the Federal Trade Commission (FTC) finalized its order with GoDaddy over allegations that GoDaddy “failed to implement standard data security tools and practices to protect customers’ websites and data.” In a...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Bennett Jones LLP

Q&A on Cybersecurity and Family Enterprises: How to Navigate the Digital Frontier

Bennett Jones LLP on

In an era where digital threats are more sophisticated than ever, cybersecurity has become a pressing concern for family enterprises. These businesses are attractive targets for cyberattacks and need to balance the critical...more

Blake, Cassels & Graydon LLP

Nouveau cadre relatif aux incidents de sécurité de l’information à l’intention des institutions financières québécoises

Le 23 avril 2025, le Règlement sur la gestion et le signalement des incidents de sécurité de l’information de certaines institutions financières et des agents d’évaluation du crédit (le « Règlement ») est entré en vigueur au...more

Hogan Lovells

EURid celebrates its 19th anniversary

Hogan Lovells on

EURid, the Registry responsible for running the .EU Top Level Domain (TLD), recently posted a publication to celebrate its 19th anniversary and highlight its achievements. EURid was incorporated under Belgian law in April...more

Goodwin

The Rise of Agentic AI: From Conversation to Action

Goodwin on

The artificial intelligence (AI) landscape is evolving at a dizzying pace. Just as organizations were adapting to generative AI and its capabilities for creating content, a new paradigm has emerged. ...more

Orrick, Herrington & Sutcliffe LLP

OIG makes seven recommendations for CFPB following major incident

On May 5, the OIG for the Fed authored a report with several recommendations for the CFPB following a major security incident regarding confidential supervisory information (CSI). The OIG issued four findings with seven...more

Alston & Bird

The Digital Download – Alston & Bird’s Privacy & Data Security Newsletter – May 2025

Alston & Bird on

Selected U.S. Privacy & Cyber Updates - DOJ Settles False Claims Act Case with MORSECORP over Cybersecurity Program - On March 26, 2025, the U.S. Department of Justice (DOJ) announced that it had reached an agreement with...more

Robinson+Cole Data Privacy + Security Insider

Employees Hiding Use of AI Tools at Work

A new study by Ivanti illustrates that one out of three workers secretly use artificial intelligence (AI) tools in the workplace. They do so for varying reasons, including “I like a secret advantage,” “My job might be...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Fisher Phillips

Court Confirms Kentucky Consumer Protection Act Doesn’t Cover Employees, But Legal Risks Remain: 5 Steps for Employers to Avoid...

Fisher Phillips on

A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #443 – Fake AI Tools Used to Install Noodlophile

Threat actors are leveraging the publicity around AI tools to trick users into downloading the malware known as Noodlophile through social media sites. Researchers from Morphisec have observed threat actors, believed to...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Farella Braun + Martel LLP

Employers Must Be Vigilant to Protect Against Security Risks from Fraudulent Hires

The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more

Accelerynt, Inc.

Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access

Accelerynt, Inc. on

Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more

Eversheds Sutherland (US) LLP

Preparing for Regulation S-P and takeaways from the SEC’s session at the Incident Response Forum Masterclass 2025

On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more

U.S. Legal Support

Cybersecurity’s Role in Legal Transcription

U.S. Legal Support on

Legal transcription services play a vital role in legal matters, ensuring that live oral arguments and other audio or video content are fully accessible to all stakeholders in text. When managing transcription...more

Hogan Lovells

NYDFS: Penultimate set of cybersecurity requirements under amended Part 500 take effect May 1, 2025

Hogan Lovells on

On May 1, 2025, additional cybersecurity requirements introduced by the Second Amendment to the New York Department of Financial Services (NYDFS) Cybersecurity Regulation (23 NYCRR Part 500) (the “Second Amendment”) took...more

Fisher Phillips

2025 Summer Reading List for Educational Leaders

Fisher Phillips on

Another school year is winding down, and educational leaders perhaps have never been more ready for summer break. From the Trump administration’s significant policy shifts to deeply consequential litigation playing out to...more

HaystackID

Ransomware Unveiled: How the LockBit Breach Exposes the Digital Extortion Economy

HaystackID on

xThe cybersecurity community has witnessed a significant development with the recent compromise of LockBit’s operational infrastructure, providing extraordinary visibility into one of the most sophisticated...more

5,609 Results
 / 
View per page
Page: of 225

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide