News & Analysis as of

Data Breach National Security

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 7, August 2024

Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more

Pillsbury - Internet & Social Media Law Blog

From Encryption to Employment, U.S. Federal Agencies Brace for the Effects of Quantum Computing, AI and More

In this week’s edition of Consumer Protection Dispatch, we look at the latest regulatory developments from the U.S. Department of Commerce, Consumer Financial Protection Bureau, and the Securities and Exchange Commission...more

K&L Gates LLP

Doing Business in Australia

K&L Gates LLP on

Australia welcomes new business and foreign investment by providing a strong economy, a stable political environment and a skilled and talented workforce. Our comprehensive guide to Doing Business in Australia has been...more

Snell & Wilmer

The Department of Justice Is Building a Data Security Protection and Enforcement Program

Snell & Wilmer on

In response to President Biden’s Executive Order authorizing increased data privacy measures, Assistant Attorney General (AAG) Matthew G. Olsen announced that the National Security Division of the Department of Justice (DOJ)...more

Sheppard Mullin Richter & Hampton LLP

For Limited Use Only: Guidance on National Security Delay Determinations under the SEC Cyber Reporting Rule

On December 12, 2023, the Department of Justice (“DOJ”) issued guidance related to the process by which companies may request the United States Attorney General authorize delays of cyber incident disclosures, pursuant to a...more

Wiley Rein LLP

SEC Breach Reporting Rules Effective as of December 18

Wiley Rein LLP on

For most filers, the U.S. Securities and Exchange Commission’s (SEC) new Form 8-K rules for reporting material cybersecurity incidents took effect yesterday, December 18, 2023. The rule has been controversial and created some...more

Husch Blackwell LLP

U.S. Electrical Grid and Renewables – Vulnerability to Cyber Attacks

Husch Blackwell LLP on

As discussed previously in this blog, physical attacks against substations have been on the rise. However, the U.S. power grid is also vulnerable to cyberattacks from U.S. adversaries, which includes hostile foreign...more

ArentFox Schiff

AI Companies Consent to Implementing Safety Measures for AI Technologies

ArentFox Schiff on

On July 21, the White House announced that seven top US artificial intelligence (AI) companies, have voluntarily committed to implementing safeguards in AI technology development. These commitments aim to manage potential...more

Paul Hastings LLP

SEC Cyber Rules Published in Federal Register

Paul Hastings LLP on

The SEC’s Cybersecurity Risk Management Strategy, Governance, and Incident Disclosure Rules were officially published in the Federal Register on August 4, 2023 and go into effect on September 5, 2023....more

Quarles & Brady LLP

SEC Rules Impose New Four-Day Reporting Requirements for Cybersecurity Incidents

Quarles & Brady LLP on

The Securities and Exchange Commission (“SEC”) voted on July 26, 2023 to adopt new cybersecurity rules, which are aimed at helping investors better understand the cybersecurity risks associated with public companies by...more

Constangy, Brooks, Smith & Prophete, LLP

SEC adopts new rule on cybersecurity risk management, disclosure

On July 26, the Securities and Exchange Commission adopted a new rule regarding cybersecurity risk management, strategy, governance, and incident disclosure. The “Cybersecurity Incident Disclosure Rule” will be applicable to...more

Alston & Bird

Chinese Hackers Exploit Gap in Cloud Environment Used by U.S. Government

Alston & Bird on

According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Holland & Knight LLP

Holland & Knight Health Dose: March 21, 2023

Holland & Knight LLP on

Holland & Knight Health Dose is an in-depth weekly dose of legislative and regulatory insights to keep stakeholders abreast of happenings in Washington, D.C., impacting the health sector. This week's topics include ... ...more

Troutman Pepper

More Privacy, Please - January 2023

Troutman Pepper on

Editor’s Note: In regulatory news, the Colorado AG published a second version of its proposed regulations. In U.S. litigation, Meta and TikTok both faced further litigation, and an Illinois court ruled that J&M Plating must...more

Robinson+Cole Data Privacy + Security Insider

Chinese State Hackers Exploit Zero-Day Vulnerabilities in Citrix Networking Equipment

According to the National Security Agency, actors backed by the Chinese government are actively targeting a zero-day vulnerability in two commonly-used Citrix networking devices. The exploit (CVE-2022-27518) affects Citrix...more

ArentFox Schiff

October 2022 AFS Privacy Report: California Privacy Protection Agency Releases Updated Draft Regulations Ahead of October 28-29...

ArentFox Schiff on

California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - Cloaked Ursa Using Trusted Online Storage Services to Evade Detection - According to research by Palo Alto’s Unit 42, the most recent campaign by advanced persistent threat Cloaked Ursa (aka APT 20,...more

Pillsbury Winthrop Shaw Pittman LLP

Twelve Hours to Get It Right: The SEC Intensifies Its Focus on Cybersecurity

The SEC’s recent enforcement actions, public statements and proposed rulemaking indicate that cybersecurity will be an area of heightened focus for the Gensler Commission. New proposed rules would require public companies...more

Stinson - Government Contracting Matters

Department of Homeland Security Issues “SHIELDS UP” Advisory for All Organizations Regardless of Size

This week the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA) issued a “SHIELDS UP” advisory.  While it does not identify specific threats in the advisory, CISA states that the “Russian...more

Health Care Compliance Association (HCCA)

FBI: More Awareness, Due Diligence Needed To Fight China in New ‘Space Race’ for Data

Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more

Robinson+Cole Data Privacy + Security Insider

Passwords Used by Iranian-Backed Hackers Against Defense Contractors

When you are educating your employees about the importance of maintaining a complex password or passphrase, share this story to show why it is so important and to emphasize not to use same or similar passphrases across...more

Health Care Compliance Association (HCCA)

To Combat Cyber Crime, White House Initiative Promises Tools; Some Seek Funding, New Laws

Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more

Bilzin Sumberg

Do the 2021 Federal Ransomware Laws Foretell Passage of Federal Data Privacy Laws?

Bilzin Sumberg on

In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more

Holland & Hart LLP

Post-Ransomware Attack: Is it Time to Return to True Systems Segmentation?

Holland & Hart LLP on

In the end, food companies must balance the process efficiencies and controls that data transmission and functionality over the internet provide with the risk of cyberattacks that cripple production. A sizeable chunk of...more

67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide