News & Analysis as of

Information Security

Mitchell, Williams, Selig, Gates & Woodyard,...

Cybersecurity Advisory to Water Systems Regarding Iranian-Affiliated Cyber Attacks: EPA, FBI, CISA, NSA Issue Joint Advisory

Several federal agencies issued on April 7th a document titled: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure (“Advisory”)....more

Carlton Fields

No Password Required: Project Manager at Rapid7 and Queen of Cyber Media

Carlton Fields on

Cynthia Wyre is a senior strategic engagement project manager at Rapid7, where she helps connect academic research and industry. Her path into cybersecurity innovation was untraditional, moving from health care and...more

Wiley Rein LLP

[Podcast] Episode 4: War Exclusions in the Cyber-Risk Era: Redefining the 'Battlefield'

Wiley Rein LLP on

As cyber operations increasingly intersect with geopolitical conflict, legacy insurance exclusions are being put to the test. In this episode of The Cyber Periscope, Pam Signorello sits down with Jessica Gallinaro to unpack...more

Pillsbury - Global Sourcing Practice

Stateful AI: What to Remember in the Shift to AI That Remembers

Providers have recently moved towards enabling AI agents to maintain persistent context and memory across interactions rather than treating each request as an isolated event. The environment makes it easier for enterprise AI...more

Robinson+Cole Data Privacy + Security Insider

Hospitals + Critical Infrastructure Organizations on Alert During Iran Conflict

The American Hospital Association (AHA) is advising hospitals and healthcare entities to “take precautionary measures in case Iran, its proxies or self-radicalized individuals attempt attacks in the U.S.” during the conflict...more

Foley & Lardner LLP

Prompt Injection: Social Engineering Attacks on AI

Foley & Lardner LLP on

Today’s AI models suffer from a critical flaw. They lack human judgment and context that makes them vulnerable to what security researchers call “prompt injection attacks.” What are prompt injection attacks? Simply put, it is...more

Mayer Brown

NYDFS Releases and Revises Comprehensive Multi-Factor Authentication FAQs

Mayer Brown on

The New York Department of Financial Services (“NYDFS”) recently updated its Frequently Asked Questions to add several detailed new FAQs on the expanded multi-factor authentication (“MFA”) rule. As of November 1, 2025,...more

Hogan Lovells

South Korea considers updates to data and cyber laws

Hogan Lovells on

Recent large‑scale data breaches across major sectors in Korea, including across the telecommunications, retail, and finance sector, have prompted swift and coordinated response from lawmakers and regulators. The National...more

Orrick, Herrington & Sutcliffe LLP

Freddie Mac issues bulletin updating servicing policies

On February 11, Freddie Mac issued a bulletin announcing significant updates to its servicing and loss mitigation policies for mortgage servicers, with those loss mitigation changes effective May 1. The revised guidelines...more

K2 Integrity

Romance Scams: Minimizing Risks To Organizations And Employees - K2 Integrity

K2 Integrity on

While many consider a romantic relationship to be a personal matter and not an organizational issue, few realize that an employee falling for a romance scam can have a direct impact on an organization’s bottom line....more

Robinson+Cole Data Privacy + Security Insider

ShinyHunters Bypassing Multifactor Authentication

Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more

Jones Day

Civil Aviation Cybersecurity: EASA Part-IS Sets New Information Security Obligations

Jones Day on

The Situation: The aviation industry is increasingly reliant on digital systems, from air traffic management to ground operations and predictive maintenance. This digital transformation has significantly broadened the...more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of North Korean Quishing Campaign

As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more

Herbert Smith Freehills Kramer

New Year, New TLD Apply for your ".BRAND"

This year, organisations around the world are being offered the opportunity to acquire their own branded internet extensions: ".BRAND" top-level domains. Moving your brand from the left of the dot(.) to the right of the...more

Carlton Fields

No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor

Carlton Fields on

Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, virtual CISO at Trace3. Jack Clabby of Carlton Fields and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s...more

Alston & Bird

The Data Act: 5 Things to Know About How the Data Act Mitigates Risks to Cybersecurity and Trade Secrets

Alston & Bird on

The Data Act is now live, raising questions about cybersecurity protections and the handling of trade secrets. Our Privacy, Cyber & Data Strategy Team highlights five key points about the new data-sharing obligations for...more

McDermott Will & Schulte

Key takeaways | AI Governance and Security Assessment Workshop

McDermott Will & Schulte on

During the AI Governance and Security Assessment Workshop, Shawn Helms and Jason Krieser of McDermott Will & Schulte and Patrick Murphy of Palo Alto Networks Unit 42, discussed ways to govern the use of generative artificial...more

DLA Piper

Cloud storage of controlled technology: New guidance for Canadian exporters

DLA Piper on

As organizations increasingly rely on cloud computing, many face complex compliance obligations under Canada’s Export and Import Permits Act (EIPA) when storing or transmitting controlled technology. Global Affairs Canada...more

Tannenbaum Helpern

SEC 2026 Exam Priorities and Considerations

Tannenbaum Helpern on

On November 17, 2025, the Securities and Exchange Commission’s (the “SEC”) Division of Examinations (the “Division”) published its examination priorities for 2026 (the “Priorities”)....more

Constangy, Brooks, Smith & Prophete, LLP

Hit with a cyberattack? What you do in the first 72 hours could save your business

When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden...more

Sheppard, Mullin, Richter & Hampton LLP

The Ghost of Employees Past: The Data Breach Risks from User-Credential Management

A recent settlement with an education service provider and three states – California, Connecticut, and New York – serves as a reminder to deactivate the credentials of departed employees. The case arose following a data...more

EDRM - Electronic Discovery Reference Model

[Webinar] Simplify Internal Investigations with Guardian Collaborate for Enterprise - December 17th, 1:00 pm - 2:00 pm ET

In today’s complex data landscape, business-related communications and messaging data are critical and often only available from mobile devices. Today, 70% of investigations are internal investigations*. Join us for an...more

Hogan Lovells

The UK’s Proposed Cyber Security and Resilience Bill

Hogan Lovells on

On 12 November 2025 the UK Government introduced its highly anticipated Cyber Security and Resilience (Network and Information Systems) Bill (the “Bill”) to Parliament. The Bill is the first major overhaul of cybersecurity...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #468 – KnowBe4 Detects Phishing Campaign Targeting Microsoft 365 Users

In a recent blog post, KnowBe4 reported that it has “uncovered an emerging advanced phishing campaign targeting Microsoft 365 users globally to steal their credentials....more

389 Results
 / 
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide