News & Analysis as of

Cybersecurity National Institute of Standards and Technology Information Security

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Ankura

Keeping Pace: The Evolution of Incident Response

Ankura on

Incident response (IR) has undergone a drastic transformation in the past two decades, adapting to the relentless evolution of the cyber threat landscape. In the early 2000s, as the internet became more deeply ingrained in...more

J.S. Held

What is an Information Security Framework and Why Do I Need One?

J.S. Held on

An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more

Ankura

[Webinar] CMMC – Practical Solutions to Managing and Securing CUI Data, Perspectives of a Foreign Defense Contractor - November...

Ankura on

Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Sheppard Mullin Richter & Hampton LLP

Third Time’s The Charm – FedRAMP Releases Draft Authorization Boundary Guidance Version 3 for Public Comment

The FedRAMP Program Management Office is seeking comments on its draft FedRAMP Authorization Boundary Guidance, Version 3.0, released on September 14, 2022. The public comment period currently is open and closes on October...more

Wiley Rein LLP

Wireless Roundup (March 2022)

Wiley Rein LLP on

Key Wireless Deadlines- NIST Requests Comment on Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight: The National Institute of Standards and Technology (NIST) seeks comment on Draft NISTIR...more

Association of Certified E-Discovery...

Analyzing the Impact of the Many New Rules of Cybersecurity

The federal government is trying to find as many ways as possible to handle the cybersecurity crisis facing the United States. While it is unlikely that Congress will pass a comprehensive federal cybersecurity law for the...more

Womble Bond Dickinson

Preparing for the Post-Quantum Migration: A Race to Save the Internet

Womble Bond Dickinson on

Most people don’t know, or care to know, about cryptography. Without cryptography, the internet privacy that we all rely on for transmitting virtually all forms of digital communication would be insecure from attackers. Our...more

Sheppard Mullin Richter & Hampton LLP

Watch Your Boundaries – FedRAMP Releases Draft Authorization Boundary Guidance for Public Comment

The FedRAMP Program Management Office is seeking comments on its draft FedRAMP Authorization Boundary Guidance, Version 2.0, released on July 13, 2021. The public comment period currently is open and closes on September 13,...more

BakerHostetler

The New IoT Cybersecurity Act Is Here

BakerHostetler on

Background - Growing awareness regarding cybersecurity concerns with the Internet of Things (IoT) has achieved a milestone with the promulgation of the IoT Cybersecurity Improvement Act (the Act), which was signed into law by...more

Wiley Rein LLP

Wireless Roundup (November 2020)

Wiley Rein LLP on

Upcoming Filing and Comment Deadlines - FCC Seeks Input on WRC-23 Advisory Committee Draft Recommendations: Comments are due November 2 on the Federal Communications Commission’s (FCC or Commission) Public Notice, which...more

NAVEX

Why You Should Prioritize Cybersecurity Risk with NIST CSF

NAVEX on

The year is 2013: The Obama administration just signed Executive Order 13636, calling for the sharing of cybersecurity risk information and a framework for reducing such risk. It was then that the National Institute of...more

Stinson - Government Contracting Matters

U.S. Government Issues Alert Regarding Critical Windows 10 Update – Are You Entitled To Compensation?

Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more

Sheppard Mullin Richter & Hampton LLP

Feds Want New IoT Guidance to Address Security Vulnerabilities

“Internet of Things” devices are listening. And now the federal government is taking notice. As we reported in our Government Contracts and Investigations blog, to date, federal cybersecurity regulations for government...more

Sheppard Mullin Richter & Hampton LLP

“Internet of Things” Guidance to be Added to Cybersecurity Requirements for Agencies and Federal Contractors

In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more

Burr & Forman

Two End-of-Year Federal Government Deadlines Approaching

Burr & Forman on

Significant Changes to Online Copyright (DMCA) Safe Harbor and DoD Contractor Cybersecurity (NIST 800-171) Requirements Take Effect at the End of This Year. Important Change Affecting Digital Millennium Copyright Act...more

Morgan Lewis

National Futures Association Proposes Cybersecurity Guidance for NFA Member Firms

Morgan Lewis on

NFA links NFA’s supervisory requirements with its proposed requirements mandating that NFA Members have information systems security programs. The National Futures Association (NFA) has proposed cybersecurity...more

Robinson+Cole Data Privacy + Security Insider

Security Frameworks 101: Which is Right for my Organization?

These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more

PilieroMazza PLLC

Not So Far Out: OMB Memo Indicates Cybersecurity FAR Clauses Are Coming Soon

PilieroMazza PLLC on

On August 11, 2015, the Office of Management and Budget (“OMB”) released a draft policy memo entitled “Improving Cybersecurity Protections in Federal Acquisitions.” The purpose of the memo is to provide federal agencies with...more

Holland & Knight LLP

Actions Foreshadow Uniform Cybersecurity Regulations for Federal Contractors - Two Recent Executive Agency Actions Lay the...

Holland & Knight LLP on

Federal government contractors handling Controlled Unclassified Information (CUI) should take notice of two recent executive agency actions. Combined, they lay the groundwork for a new cybersecurity clause to be added to the...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide