News & Analysis as of

Information Technology Cybersecurity Office of Foreign Assets Control (OFAC)

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Holland & Knight LLP

Commerce Department: Final Determination of Russia-Backed Cybersecurity, Antivirus Software

Holland & Knight LLP on

The U.S. Department of Commerce's Office of Information and Communications Technology and Services (OICTS) within the Bureau of Industry and Security (BIS) issued a Final Determination on June 20, 2024, pursuant to Executive...more

Fenwick & West LLP

To Pay or Not to Pay: Five Critical Approaches to Beating a Ransomware Threat

Fenwick & West LLP on

It’s the call you hope you never get. Your company has been hit with a ransomware attack. Your systems are offline. Your customer data was stolen by an unknown threat actor who is threatening to leak it. You have lots of...more

Sheppard Mullin Richter & Hampton LLP

NYDFS Issues Ransomware Guidance

The New York State Department of Financial Services recently announced new guidance addressing ransomware attacks, and highlighting cybersecurity measures to significantly reduce the risk of an attack. The guidance comes as...more

Burr & Forman

Cyber-Security Awareness Month & Phishing FINRA

Burr & Forman on

Phishing FINRA - October is cyber-security awareness month, so it’s only appropriate that FINRA started it with another Regulatory Notice warning member firms to beware of a false-survey phishing scheme.  The Notice warns...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide