News & Analysis as of

Network Security

The Data Report: Data Security for Travelers

by Bilzin Sumberg on

This week on The Data Report, Litigation attorney Jay Ward discusses data security for travelers. He highlights tips for maintaining your privacy while on the road, including using a VPN and only accessing webmail from a...more

10 Data Security Management Tips to Prevent a Data Breach

by Revision Legal on

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the...more

10 steps to better cybersecurity -‘Intellectual Values seminar series #1’ video

by Hogan Lovells on

Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more

Privacy Tip #115 – Cyber Monday Safe Online Shopping

It is estimated that we will spend $4 billion online this year, including on Cyber Monday, coming up in just a few days. With the increase in online shopping, particularly over the holidays, it is prime time for scheming...more

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

Boo! “Witch” one should you have, HTTP or HTTPS?

by McManis Faulkner on

With Halloween season here, it’s important to be aware of the spooks on the web. It is a scary online world, and now more than ever is the time to take measures to strengthen the security of your website....more

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

by McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal...more

Government Warns of Threat Activity Targeting Critical Infrastructure through Third-Party Access

A cloak of secrecy usually covers covert government activities when it comes to the latest cyber threats and intelligence. But in a rare public statement, the U.S. government has warned that hackers are targeting government...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Hyatt Data Breach Impacts 41 Locations in 11 Countries

Hyatt Hotels Corporation recently announced that it had identified malicious software code resulting in unauthorized access to customer payment card information. Hyatt disclosed that upon investigating the incident, it...more

FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

by Snell & Wilmer on

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a...more

FTC Provides Guidance on Reasonable Data Security Practices (Part II of III)

by Patrick Law Group, LLC on

This is the second in a series of three articles on the FTC’s Stick with Security blog... Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FBI Issues Flash Alert on Apache Struts Vulnerability

The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most damaging data breaches in history....more

Securing Your Home’s Digital Entry Points

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

Financial Services Quarterly Report - Second Quarter 2017: China Cybersecurity Law: Key Takeaways for Financial Services Firms in...

by Dechert LLP on

China’s Cybersecurity Law came into force on 1 June 2017, despite speculation that there would be a delay in its launch. The new law covers a wide range of activities relating to the cyberspace, including personal data...more

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices

by CloudNine on

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

PRC’s New Cybersecurity Law to be implemented on June 1, 2017

by Dechert LLP on

Potential Implications for Foreign Network Products and Services - Cybersecurity is of national strategic importance to China, which has the largest group of internet users and the largest internet market in the world....more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Qakbot: Insight into a Persistent, Polymorphic Malware from the Cyber Defense Team at K2 Intelligence

Qakbot (Qbot) first emerged in 2009 as a piece of malware designed to steal online banking credentials from infected computers. It used classic key-logger technology combined with an ability to steal active session...more

California Bill Mandates Privacy By Design For IoT Devices

by Womble Bond Dickinson on

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

56 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.