News & Analysis as of

Information Technology Encryption

Troutman Pepper Locke

6 Considerations to Determine if a Cyber Incident Is Material

Troutman Pepper Locke on

In late June, the staff of the U.S. Securities and Exchange Commission’s Division of Corporation Finance released five new compliance and disclosure interpretations regarding the disclosure of material cybersecurity incidents...more

Holland & Knight LLP

Quantum Computing: The Looming Threat of Quantum Decryption

Holland & Knight LLP on

Every portion of a home relies on a solid foundation. If that foundation fails, then everything above it could also be compromised. Many systems work this way: There are one or more critical elements that act as their...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

White and Williams LLP

NIST Releases Security Guidelines for Storage Infrastructure

White and Williams LLP on

Storage infrastructure, along with computing and network infrastructures, represents one of the fundamental pillars of Information Technology (IT). Just like computing and networking, the storage infrastructure landscape is...more

Reveal

How to Maintain CCPA Compliance in the Cloud

Reveal on

As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Hogan Lovells

Data Protection Authority of Baden-Württemberg Issues First German Fine Under the GDPR

Hogan Lovells on

In the first fine issued by a German data protection authority under the European General Data Protection Regulation (“GDPR”), on 21 November 2018 the authority of the German state of Baden-Württemberg (“LfDI”) imposed a fine...more

White and Williams LLP

Data Breach Report Reveals Cost Saving Measures for Companies

The Ponemon Institute has released a recent report concluding, among other things, that the cost to a company suffering a data breach in the U.S. has risen eight percent year-on-year from 2017. The total cost of the average...more

Robinson+Cole Data Privacy + Security Insider

NIST releases draft guide for use of mobile devices for medical providers

The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more

McGuireWoods LLP

Congress Talks Encryption

McGuireWoods LLP on

The Information Technology Subcommittee of the Committee on Government Oversight and Reform of the US of House of Representatives last Wednesday held a hearing on encryption technology and potential US policy responses....more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide