News & Analysis as of

Cybersecurity Supply Chain Cyber Attacks

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Hogan Lovells

Threat actors increasingly introducing malicious code into open source packages

Hogan Lovells on

The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more

Ropes & Gray LLP

Glow Up or Sell Out? Opportunities and Risks in the Consumer Health and Beauty Sector

Ropes & Gray LLP on

The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Womble Bond Dickinson

Cybersecurity: Salt Typhoon’s Persistence is a Cruel Lesson for Smaller Providers

Womble Bond Dickinson on

This article is based on Carri Bennet’s April 9th presentation at the Palmetto Broadband Coalition Annual Convention in Greenville, S.C. In December 2024, the White House’s Deputy National Security Adviser for Cyber and...more

Husch Blackwell LLP

Cybersecurity and Solar Power Vulnerability

Husch Blackwell LLP on

As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more

Blank Rome LLP

The BR International Trade Report: January 2025

Blank Rome LLP on

Welcome to this month’s issue of The BR International Trade Report, Blank Rome’s monthly digital newsletter highlighting international trade, sanctions, cross-border investment, geopolitical risk issues, trends, and laws...more

Ankura

7 Strategies to Overcome Supply Chain Disruptions: Mitigate Risk While Enhancing Resilience and Adaptability

Ankura on

Supply chain disruption and persistent inflation remain critical issues in the global economy, with ongoing geopolitical tensions, the evolution of digital threats, and increasing emphasis on sustainability reshaping the...more

DLA Piper

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act?

DLA Piper on

Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 1

Foley & Lardner LLP on

As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

Parker Poe Adams & Bernstein LLP

Key Lessons for Cybersecurity and IT Leaders From Judge's Recent Fraud Decision in SEC Case Against SolarWinds

On July 18, a New York federal judge threw out most of the SEC’s claims brought against both SolarWinds Corp. and the company’s chief information security officer (CISO), Timothy Brown....more

Foley & Lardner LLP

What Goes Around Comes Around: The Resurgence of Data Breach Class Actions

Foley & Lardner LLP on

Data breach class actions are again on the rise, with a recent report by Lex Machina confirming what many cybersecurity practitioners have seen first-hand over the last two years. The findings also reaffirm longstanding best...more

Ballard Spahr LLP

XZ Utils Supply Chain Attack Sheds Light on Vulnerabilities in Widely Adopted Open Source System

Ballard Spahr LLP on

In a reminder that open source products can carry significant risks beyond intellectual property, a vulnerability in a compression tool commonly used by developers has triggered widespread concerns....more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Mitratech Holdings, Inc

5 GRC Trends and Resolutions for a More Secure 2024

Elevate your resilience in the new year by understanding top GRC trends, patterns, and best practices across AI, TPRM, cyber risk, and more. As we step into 2024, technological advancements and an increasingly connected —...more

Fenwick & West LLP

Opportunities Abound in New National Defense Authorization Act

Fenwick & West LLP on

The Fiscal Year 2024 National Defense Authorization Act (“FY2024 NDAA”) continues the national security imperative to enhance the country’s scientific and technological developments and to adopt emerging technologies and...more

Mitratech Holdings, Inc

Aligning your cyber risk management program with your company’s bottom line

The key to gaining buy-in for your cyber risk roadmap under tightening budgets and staffing challenges. This statement should come as no surprise: there’s been an alarming rise in the number and sophistication of cyber...more

Foley & Lardner LLP

Recommendations for Managing Cybersecurity Threats in the Manufacturing Sector

Foley & Lardner LLP on

In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Jackson Lewis P.C.

Dealing With the Growing Threat of Cyberattacks in Manufacturing Sector: What Employers Need to Know

Jackson Lewis P.C. on

For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more

108 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide