News & Analysis as of

Data Breach Cybersecurity Technology Sector

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Clark Hill PLC

Right To Know - April 2025, Vol. 28

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more

Goodwin

Crossing Administrations: The Focus on Federal Cybersecurity Continues

Goodwin on

Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more

HaystackID

Jaguar Land Rover Breach Highlights Growing Cybersecurity Risks in Automotive Sector

HaystackID on

A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more

Skadden, Arps, Slate, Meagher & Flom LLP

State Attorneys General May Fill Enforcement Void Left by Shift in Federal Priorities

Key Points - - State AGs nationwide are focusing on initiatives in data privacy, cybersecurity, consumer protection and securities fraud. - Special areas of concern also include AI and online privacy and protections for...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 2, February 2025

Welcome to our second issue of 2025 of Decoded - our technology law insights e-newsletter. For those of you with an interest in the Corporate Transparency Act, Brienne Marco and Joe Unger report that the recent injunction...more

Miller Nash LLP

Enterprise Liability Insurer Has Duty to Defend Against a Vendor’s Claim, Even When Presented as an Invoice for “Usage Fees”

Miller Nash LLP on

In a win for policyholders, a federal court in Washington recently held that an insurer had a duty to defend a technology company against a vendor’s demand for damages it allegedly suffered when hackers accessed software...more

Sheppard Mullin Richter & Hampton LLP

Sheppard Mullin’s 2024 Eye on Privacy Year in Review

It is hard to believe that another year is upon us! As we have done in years past (including 2023, 2022, 2021, 2020, 2019 and 2018), we have created a comprehensive resource of all our www.eyeonprivacy.com posts from 2024. As...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 8, October 2024

Welcome to our eighth 2024 issue of Decoded - our technology law insights e-newsletter. Thank you for reading. EU AI Act Tightens Grip on High-Risk AI Systems: Five Critical Questions for U.S. Companies - Why this is...more

A&O Shearman

Cyber-attack victim obtains injunction to prevent publication of stolen data

A&O Shearman on

Following a high-profile cyber-attack earlier in the year which impacted the medical data of NHS patients, the English High Court granted Synnovis an interim injunction which prevents the publication of the stolen data. This...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 7, August 2024

Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

J.S. Held

Cybercrime vs. Cybersecurity: Learning the Tactics of Criminals to Protect Your Interests

J.S. Held on

Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more

Health Care Compliance Association (HCCA)

Privacy Briefs: May 2024

Kaiser Permanente is notifying 13.4 million current and former members that their personal information may have been compromised when it was transmitted to tech giants Google, Microsoft Bing and X (formerly Twitter) when...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 10, December 2023

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data? As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?", we are addressing the...more

Foley Hoag LLP - Security, Privacy and the...

CISA Publishes Mitigation Guide to Combat Cyber Threats in the Healthcare and Public Health Sectors

If you need a little intellectual stimulation after hours of Thanksgiving turkey and football, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just the thing — the new CISA Mitigation Guide for the...more

Pillsbury - Internet & Social Media Law Blog

News of Note for the Internet-Minded (8/30/23) – Ransomware, Quantum Attacks and a New LLM

In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 4, Issue 7, August 2023

You may be Entitled to Financial Compensation…for Your Data - “Without all of our writings and photos that AI companies are using to train their models, they would have nothing to sell.” Why this is important: This...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity - June 2023

In our June Privacy & Cybersecurity Update, we review new data privacy laws in Colorado, Connecticut, Florida and Montana; Verizon’s annual Data Breach Investigations Report; AM Best’s report on cyber insurance trends; and...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 5, May 2023

Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Littler

Brazilian National Data Protection Agency (ANPD) Discloses List of Companies Being Investigated

Littler on

In the wake of the Brazilian National Data Protection Agency (ANPD) issuing further regulations on the determination of penalties for violations of the Data Protection Law (LGPD), on March 23, 2023 the ANPD launched a new...more

Proskauer on Privacy

SolarWinds: A Lesson on How Companies Victimized by Data Breaches Can Quickly Become the Target of Litigation and Regulatory...

Proskauer on Privacy on

In 2020, SolarWinds Corp., a company that provided information technology software to private and government entities, was the victim of a cybersecurity breach. Russian hackers are believed to have slipped malicious code...more

Bradley Arant Boult Cummings LLP

How Not to Make a Deal: 5 Key Cybersecurity Concerns in M&A

Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more

58 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide