News & Analysis as of

Information Technology

Countdown to the First Annual New York DFS Cyber Regulation Certification

On February 15th, organizations subject to the New York Department of Financial Services Cybersecurity Regulation are required to submit their first annual certification attesting to their compliance with the state’s new data...more

Customs and Border Patrol Issue New Rules for Searching Devices at Borders

We previously reported that U.S. Customs and Border Patrol (CBP) have been stopping U.S. citizens at the borders of the United States and demanding passwords for access to mobile devices. According to CBP, 19,051 mobile...more

Health Care Organizations Saw an 89 percent Increase in Ransomware in 2017

Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the number of hacking events targeted at health care entities involving...more

Privacy Tip #120 – Follow FBI Warning About Connected Toys

The Federal Bureau of Investigation (FBI) issued a warning to parents in the past about the concerns with connected toys. Many parents recently bought the newest gadgets for their kids over the holidays, without realizing the...more

Health Care Industry Must be Mindful of ‘Information Blocking’

by Polsinelli on

Under the 21st Century Cures Act (Cures Act), the Health and Human Services (HHS) Secretary is mandated to have promulgated regulations by Dec. 13, 2017 that, among other requirements, prohibit “information blocking” as a...more

Russian Legislation Update: September – December 2017

by White & Case LLP on

Welcome to the most recent issue of our Russian Legislation Update, covering the period of September – December 2017. In this issue: - Civil Law - Banking - Currency Control - Corporate - Mass Media / Foreign...more

OIG December 2017 Work Plan Update

by Baker Ober Health Law on

The OIG added six items to its Work Plan with the December 2017 update, as listed in the chart below. Interestingly, three of the new items relate to Medicaid, and two relate to the opioid epidemic. Medicare Advantage...more

Appellate Court Rules IT Worker Liable Under CFAA for Sabotaging Employer's Network

by Fenwick & West LLP on

The U.S. Court of Appeals for the Fifth Circuit affirmed the Computer Fraud and Abuse Act conviction of an IT worker who sabotaged his employer’s network, rejecting the argument that an IT worker’s authorized access to...more

Know Before You Grow: Proprietary Transportation Systems and Open Source Software Risk

by Benesch on

We live in the era of gig economies and e-commerce, where supply chains are evolving before our eyes due in part to the speed of technological innovation. All transportation and logistics services are under pressure to...more

10 steps to better cybersecurity -‘Intellectual Values seminar series #1’ video

by Hogan Lovells on

Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more

2018 NDAA Analysis: Acquisition Workforce Improvements

by Holland & Knight LLP on

This is the sixth blog post in a series of blogs analyzing the current draft of the 2018 National Defense Authorization Act (NDAA) as agreed-to by House and Senate negotiators on November 8, 2017. Stay tuned for additional...more

Five on Friday – Five Recent Developments that We’ve Been Watching Closely - December 2017

It’s Friday and time for another overview of developments in the field of business and human rights that we’ve been monitoring. This week’s post includes: a revised Toolkit on National Action Plans on business and human...more

Top 10 Things to Do in the Event of a Data Breach

This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more

Despite Equifax Breach Causes, Social Engineering Still Biggest Threat to Data Security

by LeClairRyan on

It’s now been widely reported that the cause of the recent Equifax data breach, which compromised the personal data of perhaps as many as 143 million people, was the result of the company’s alleged failure to apply a patch to...more

Intel Bug Affects Millions of Devices

Intel has confirmed that a bug in its remote server management tool, known as Management Engine, which allows administrators of IT systems to remote access devices to apply updates or troubleshoot problems for users, allows...more

Data Privacy + Cybersecurity Insider - November 2017 #4

by Robinson & Cole LLP on

Intel has confirmed it has a bug in its remote server management tool. The tool, known as Management Engine, permits administrators of IT systems to access devices remotely to apply updates or troubleshoot problems for users....more

Healthcare Data Breaches Continue but Fell in October

The news about data breaches always seems to be dire lately. Some good news: data breaches in the healthcare industry were lower in October than in September, based upon reportable data breaches to the Office for Civil Rights...more

White House Announces Vulnerabilities Equities Policy and Process

by Balch & Bingham LLP on

On November 15, 2017, the Trump administration released the Vulnerabilities Equities Policy and Process. This documents describes the process by which U.S. agencies and departments determine whether to disclose or restrict...more

Locky Ransomware Variant Difficult to Detect

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs....more

Data Privacy + Cybersecurity Insider - November 2017 #3

by Robinson & Cole LLP on

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs. Now, researchers at Cylance have discovered...more

Data Security Top Concern for Higher Education IT Professionals

At its annual conference, EDUCAUSE announced that the issue that is at the top of the 2018 Top 10 IT Issues is data security. This is no surprise. It has been the top concern for the past three years....more

Artificial Intelligence: Expectations of the IT Department

by Morgan Lewis on

Artificial intelligence (AI) is the hot topic on everyone’s mind. Technology providers are researching and developing how they can exploit AI, companies in a wide range of industries are seeking to understand how AI will...more

Data Breach Costs an Average of $3.6 Million

There have been a myriad of research studies attempting to come up with the “cost” of a data breach. The most recent, released by AT&T, estimates that it costs organizations $3.6 million to recover from a data breach....more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

A CIO Budget Playbook for 2018

It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more

351 Results
|
View per page
Page: of 15
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.