News & Analysis as of

Data Security Vulnerability Assessments Today's Popular Updates

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Akerman LLP - Health Law Rx

OCR Will Focus on You if You Don’t Focus on Cybersecurity

With a couple of “firsts,” the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is signaling that it is cracking down on healthcare organizations that fail to identify and address cybersecurity...more

Robinson+Cole Data Privacy + Security Insider

High Alert: China Linked BlackTech Hides in Router Firmware

Not only is the People’s Republic of China (PRC) a threat with its use of TikTok, but it also supports threat actors that have for years attacked U.S. based companies as well as the governments of the U.S. and Japan....more

Rothwell, Figg, Ernst & Manbeck, P.C.

Is Privacy Enforcement Impending for Generative Artificial Intelligence Technologies?

Just last week, researchers at Robust Intelligence were able to manipulate NVIDIA’s artificial intelligence software, the “NeMo Framework,” to ignore safety restraints and reveal private information. According to reports, it...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2023

Robinson & Cole LLP on

CYBERSECURITY - World Economic Forum’s Global Cybersecurity Outlook for 2023 Is Bleak - Sorry to be the bearer of bad news but remember that I am only the messenger. According to the World Economic Forum’s Global...more

Robinson+Cole Data Privacy + Security Insider

World Economic Forum’s Global Cybersecurity Outlook for 2023 Is Bleak

Sorry to be the bearer of bad news but remember that I am only the messenger. According to the World Economic Forum’s Global Cybersecurity Outlook 23 Insight Report (published in collaboration with Accenture), although...more

Ankura

Ankura CTIX FLASH Update - October 2022 - 3

Ankura on

Prestige Ransomware Emerges, Targets Ukraine and Poland - A new ransomware variant has emerged in the wild, being used in targeted attacks against the logistics and transportation sectors within Ukraine and Poland. The...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022

Robinson & Cole LLP on

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

Dechert LLP

Dechert Cyber Bits - Issue 5

Dechert LLP on

FTC Announces Regulatory Priorities for 2022 - On December 10, 2021, the Federal Trade Commission (“FTC”) published its Statement of Regulatory Priorities (“Announcement”) for 2022. The FTC’s priorities for the coming year...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Wyrick Robbins Yates & Ponton LLP

Fraudulent Wire Transfers: Who Bears the Loss and How to Prevent Becoming A Victim

Cybercriminals exploited remote work during the COVID-19 pandemic.  In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more

Ankura

Implementing the NIST Privacy Framework – Protect Function

Ankura on

This is the final installment in a series of articles on the core functions of the National Institute of Standards and Technology (NIST) Privacy Framework where we cover the Protect function. As previously published in an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2021

Robinson & Cole LLP on

CYBERSECURITY - Cyber Criminals Focusing on Clinics + Business Associates - As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2021 #5

Robinson & Cole LLP on

CYBERSECURITY - CISA Issues Alert on Top Exploited Vulnerabilities - On July 28, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) issued a cybersecurity alert entitled “Top Routinely Exploited...more

Robinson+Cole Data Privacy + Security Insider

CISA Releases Free Tool to Detect Potential Compromised Microsoft Accounts

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) recently released a free tool that will assist organizations with identifying indicators of compromise following threat activity in...more

Robinson+Cole Data Privacy + Security Insider

Cyberattacks and Cybersecurity Failure Top Risks of the Next Decade Says World Economic Forum

Although somewhat obvious, the World Economic Forum, in partnership with Marsh McLennan, SK Group and Zurich Insurance Group, recently issued its 16th edition of the Global Risks Report (the Report), which analyzes “the risks...more

Kramer Levin Naftalis & Frankel LLP

The Diligence Process for Privacy and Data Security: Telltale Indicators of a Data Program’s Strengths and Weaknesses

The rapid expansion of data security and privacy laws and regulations — both in the United States and internationally — harbors the potential for substantial liability, with the consequence that cyber compliance has become an...more

Robinson+Cole Data Privacy + Security Insider

Secureworks 2020 Incident Response Report Confirms Increased Vulnerabilities with At Home Workers During Pandemic

Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2020 #4

Robinson & Cole LLP on

CYBERSECURITY - Connecticut Insurance Department Reminds Licensees to Comply with Data Security Law - On July 20, 2020, the Connecticut Insurance Department issued a bulletin to licensees reminding them that the Connecticut...more

Carlton Fields

Six Steps to Protect Against Increased Telehealth Cybersecurity Dangers

Carlton Fields on

Last week, the American Medical Association (AMA) and the American Hospital Association (AHA), recognizing the increased cybersecurity threats facing health care providers, issued joint guidance for physicians working from...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - April 2020

Robinson & Cole LLP on

Microsoft Issues Cybersecurity Risk Warning and Offers Help to Hospitals During COVID-19 Crisis - On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk...more

Burr & Forman

Cyber Still Atop Exam Priorities

Burr & Forman on

FINRA held its bi-annual Cybersecurity Conference in January and recently published five take-away real-world experiences from the conference...more

39 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide