News & Analysis as of

Data Protection Data Security Network Security

Latham & Watkins LLP

China Clarifies Privacy and Data Security Requirements in Network Data Security Management Regulations

Latham & Watkins LLP on

The Regulations, which took effect on January 1, 2025, reiterate and clarify existing requirements and introduce new ones on privacy and network data security....more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Integreon

Top Five Considerations When Responding to a Cyber Breach

Integreon on

When a cyber breach occurs, cooler heads need to prevail.  This can be a highly emotional and stressful occurrence.  Being prepared and having a clear plan of action will help you stay focused, meet your compliance...more

Bradley Arant Boult Cummings LLP

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #373 – If you Use Windows Copilot —Configuration Update Issued by Microsoft This Week

On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2  (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #367 – Update your Apple Operating System to 16.6 NOW

On Monday, July 24, 2023, Apple issued a security update to address vulnerabilities that have been linked to a spyware campaign. iOS 16.6 fixes 25 iPhone security flaws, several of which are being exploited by threat actors...more

Accelerynt, Inc.

Best Patch Management Strategy for Remote Workers

Accelerynt, Inc. on

Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Bass, Berry & Sims PLC

Privacy Perils: Password Quarantine Hygiene

Bass, Berry & Sims PLC on

Some have used the pandemic, and now the extended inclement weather, to learn to play a musical instrument, speak a new language or another new skill. If those are beyond any of your reasonable expectations, do not simply...more

Faegre Drinker Biddle & Reath LLP

IT Security Trends in the Era of COVID: Our Top Five Tips for Making Your Network Safer in 2021

As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more

K2 Integrity

Cybersecurity Awareness Month may be over – but threats are year round

K2 Integrity on

Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more

Robinson+Cole Data Privacy + Security Insider

Pay Attention to Your Firewalls

After the Capital One data breach, which was reportedly caused by an improperly configured firewall, every company should be paying attention to its firewalls....more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Bass, Berry & Sims PLC

Privacy Perils: I Spy Your Wi-Fi

Bass, Berry & Sims PLC on

Public Wi-Fi networks are a wonderful thing, particularly if you subscribe to a limited carrier data plan and have spent the month streaming Bachelor in Paradise or your favorite NCAA and NFL teams’ games. However, by...more

Robinson+Cole Data Privacy + Security Insider

FBI Warning: Russian Hackers Attacking Routers

Late last week, the Federal Bureau of Investigation (FBI) issued a warning to U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28 and believed to be backed by the Russian government) had...more

K2 Integrity

Securing Your Home’s Digital Entry Points

K2 Integrity on

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

McDermott Will & Emery

China’s Network Security Law Comes into Effect: What It Means for Your Company

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

Dechert LLP

PRC’s New Cybersecurity Law to be implemented on June 1, 2017

Dechert LLP on

Potential Implications for Foreign Network Products and Services - Cybersecurity is of national strategic importance to China, which has the largest group of internet users and the largest internet market in the world....more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

King & Spalding

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

King & Spalding on

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Morrison & Foerster LLP

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

Arnall Golden Gregory LLP

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide