News & Analysis as of

Incident Response Plans Cybersecurity Supply Chain

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Hogan Lovells

Security Snippets: CISA publishes sector-specific cyber performance goals for IT and product design

Hogan Lovells on

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more

Pillsbury Winthrop Shaw Pittman LLP

Navigating the EU’s “NIS 2” Directive: Key Cybersecurity Compliance Points for Businesses Operating in the EU to Consider

The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more

NAVEX

Understanding the NIS2 Directive: What it Means for Cybersecurity in the EU

NAVEX on

You might have yet to hear of the NIS2 Directive, but you should be aware of it if you’re in any sector that relies on digital infrastructure. Whether you’re a business owner, IT professional, or curious about how the EU...more

Parker Poe Adams & Bernstein LLP

Key Lessons for Cybersecurity and IT Leaders From Judge's Recent Fraud Decision in SEC Case Against SolarWinds

On July 18, a New York federal judge threw out most of the SEC’s claims brought against both SolarWinds Corp. and the company’s chief information security officer (CISO), Timothy Brown....more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Foley & Lardner LLP

Introduction: What is Supply Chain Management?

Foley & Lardner LLP on

Share on Twitter Print Share by Email Share Back to top In recent years, viral videos featuring a surprising topic have racked up millions of views on social media. Not videos of a celebrity doing something outrageous, a...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Spilman Thomas & Battle, PLLC

The Site Report - Construction Industry Insights, Issue 3, March 2024

Welcome to our third issue of 2024 for our construction industry insights e-newsletter - The Site Report. In honor of last week’s Women in Construction Week, last Friday’s International Women’s Day, and Women’s History...more

Baker Donelson

Top Privacy and Cybersecurity Issues to Track In 2024

Baker Donelson on

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Davis Wright Tremaine LLP

CISA, UK NCSC, and 17 Other Countries Issue Landmark Joint Guidelines for Secure AI System Development

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (UK NCSC), along with partner agencies from 17 nations, have released Guidelines for Secure AI System Development (the...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Lighthouse

Cybersecurity Defense: Biden Administration Executive Order a Great Start Towards a More Robust National Framework

Lighthouse on

On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more

Goodwin

Biden Executive Order Likely to Push Private Sector Forward on Cybersecurity

Goodwin on

On May 12, President Biden signed an Executive Order on Improving the Nation’s Cybersecurity. The order comes on the heels of a number of recent widely reported cybersecurity crises, including the Solar Winds and Microsoft...more

Hogan Lovells

NYDFS recommends critical new practices to reduce supply chain risk in wake of SolarWinds attack

Hogan Lovells on

On April 27, 2021, the New York State Department of Financial Services (“DFS” or the “Department”) released a report regarding its investigation into the response by DFS covered entities to the SolarWinds supply chain attack....more

Proskauer - New Media & Technology

How to Respond to the SolarWinds “Orion” Supply Chain Attack

As reported last week, it appears that a state-sponsored security hack has resulted in a major security compromise in widely-used software offered by a company called SolarWinds. The compromised software, known as Orion, is...more

Hogan Lovells

Life Sciences and Health Care Horizons - 2020

Hogan Lovells on

We are pleased to provide you with the third annual installment of our Life Sciences and Health Care Horizons guide. For each of these guides, we have asked our industry thought leaders throughout the world to write about...more

Robinson+Cole Data Privacy + Security Insider

Think Like a Hacker

I was with a bunch of CFOs this week talking about cybersecurity and I told them how easy it is for hackers these days. They can infiltrate a company’s system by compromising an O365 account that doesn’t have multi-factor...more

Benesch

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Foley & Lardner LLP

The Top Six Takeaways from Auto-ISAC's and NHTSA’s Cybersecurity Best Practices

Foley & Lardner LLP on

As cars continue to rely more and more on systems that closely resemble those that run mobile phones and personal computers, it’s no surprise that the original equipment manufacturers (OEMs) and suppliers of car parts need to...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide