News & Analysis as of

National Institute of Standards and Technology

Kaspersky: Back in the News and What to Do About the Order to Stop Using Kaspersky Products and Services

by McGuireWoods LLP on

Kaspersky Lab is once again in the news as questions are being raised about the role of Kaspersky software in a reported hack of the National Security Agency. The story repeats the all-too-frequent scenario of an employee—in...more

DoD Contractor’s DFARS Cybersecurity Deadline

At this time last year, the Department of Defense issued a Defense Federal Acquisition Regulation Supplement (DFARS) intended to better protect controlled data and national security networks from cybersecurity threats....more

Alert: DoD Contractors Required to Meet Cybersecurity Requirements by Year End

by Cooley LLP on

The window for Department of Defense (DoD) contractors to bring themselves into compliance with cybersecurity requirements is closing. Specifically, changes to the Defense Federal Acquisition Regulation Supplement (DFARS)...more

The Digital Download - Alston & Bird’s Privacy & Data Security Newsletter - October 2017

by Alston & Bird on

An English-Language Primer on Germany’s GDPR Implementation Statute. Expanding on his recent article for Bloomberg BNA, Alston & Bird associate Dan Felz offers a multipart primer on Germany’s new GDPR implementation statute....more

Cyber Winter is Here, and Coming to Regulation: New York Cybersecurity Rule Ice Dragon Heading for the Wall

The State of New York’s response to two large cybersecurity breaches may fuel the transformation of the state regulation of corporate cybersecurity in the U.S. Unlike typical state data breach statutes which focus on...more

Cyber Week in Preview: SEC Hack, Equifax CEO on Hot Seat and Energy Sector Cyber Spend

As we start the new week, a recap of major cybersecurity developments: Equifax CEO Faces Senate Committee – Senate staffers are busy readying cross examination scripts for the testimony next week of Equifax Inc. Chief...more

Deadlines Approach for Government Contractors on Cybersecurity Compliance

Government contractors are subject to cybersecurity requirements, found in the Federal Acquisition Regulation (FAR) and each agency’s supplement to the FAR, and some important deadlines are fast approaching. Set forth below...more

Global Privacy & Cybersecurity Update Vol. 15

by Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Comments on Improvements to IoT Device Security - On June 19, the Federal Trade Commission ("FTC") submitted comments to a working group organized by the...more

Congressional Task Force Issues Report on Cybersecurity in the Health Care Industry

by Polsinelli on

Recently, the Health Care Industry Cybersecurity Task Force (the “Task Force”) issued its Report on Improving Cybersecurity in the Health Care Industry (the “Report”). The Task Force, which was created by Congress as part of...more

Mitigating Third Party Data Breach Risks

by Reed Smith on

Increasingly, organizations look to third parties to collect, process, and store their data. In some instances, organizations reduce their net risk by outsourcing these data functions to companies with a core competence in...more

Government Response to Increasing Cyber Threats

by McGuireWoods LLP on

Government agencies collect and hold massive amounts of personally identifiable information (PII), creating valuable targets for cybercrime. Recently proposed legislation would impose baseline standards for cyber hygiene on...more

NIST Updates Its Security and Privacy Guidance

by Reed Smith on

Earlier this month, the National Institute of Standards and Technology (“NIST”) issued its fifth and latest draft of its “Security and Privacy Controls for Information Systems and Organizations” guidance document. The NIST...more

NIST Expands Info Security Guidance To Include Industry

by King & Spalding on

On August 15, 2017, the National Institute of Standards and Technology (“NIST”) updated its Security and Privacy Controls for Information Systems and Organizations guidance (the “Guidance”) for federal information systems....more

NIST Updates Digital Identity Guidelines for Federal Agencies

This month, the National Institute of Standards and Technology (NIST) announced in a Bulletin that it has updated its Digital Identity Guidelines, which “provides agencies with technical guidelines regarding the digital...more

Privacy Tip #102 – How to Educate Your Employees to Use Long, Easy to Remember Passwords

I feel like I have been writing about Passwords over and over and that’s because I have. Despite hearing about how important passwords are over and over again, compromised passwords continues to be an issue for organizations....more

NIST Publishes Updated Cybersecurity Guidance and Guidance on Passwords

The National Institute of Science and Technology (NIST) has long been a leading authority in Cybersecurity—even before Cybersecurity became a household name. It originally published its Cybersecurity Framework-intended not...more

Analysis: Cyber-Monitoring: The Next Frontier

by Dickinson Wright on

Cybersecurity is “hot” and will stay “hot” for corporations, executives, regulators, law enforcement and legislators. Rarely is there a corporate compliance discussion in 2017 where cyber isn’t “the” topic or a material part...more

The Internet of Things Cybersecurity Improvement Act of 2017: A potential mandate for security standards applicable to...

by Hogan Lovells on

On 1 August 2017, a bipartisan group of four U.S. senators (Steve Daines (R-MT), Cory Gardner (R-CO), Mark Warner (D-VA), and Ron Wyden (D-OR) introduced the Internet of Things (IoT) Cybersecurity Improvement Act of 2017....more

Recent HHS Activity Following International Cyber Attacks

by Steptoe & Johnson PLLC on

Following recent international cyber attacks, the U.S. Department of Health and Human Services (HHS) has issued warnings to healthcare organizations, provided a cyber attack checklist, and launched its revised HIPAA Breach...more

FTC Blog Post Series Makes Common Sense Of Data Security

by BakerHostetler on

Recently, data security experts and regulators have said that “businesses should use a common sense approach” when addressing data security. However, rarely do I hear clients or other business professionals speak in those...more

NIST Issues New Password Security Recommendations: Keep It Simple, Long And Memorable

by Fox Rothschild LLP on

The United States National Institute for Standards and Technology (NIST) has issued new guidelines for creating secure passwords. NIST guidelines, which are directed to “federal government systems,” often become best...more

Senators Introduce Legislation to Improve Cybersecurity of Internet-Connected Devices

by Tucker Arensberg, P.C. on

It is estimated that the number of devices connected to the internet could reach 30 billion by 2020. These connected devices include mobile phones, household appliances, smart watches, and even vehicles....more

Retired NIST Expert Says His Advice on Creating Passwords was Wrong: Cybersecurity Best Practices

by CloudNine on

If you’re a person who takes password security seriously and followed advice to create passwords that use a combination of lower and upper case letters, numbers and special characters to foil hackers, good for you. ...more

The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!

Great article in the Wall Street Journal this week (paywall), on the history of passwords and password management. I did not know that the seeming obsession with passwords featuring a strange mixing of capital letters,...more

A Federal Cyber Security Law Coming Your Way?

by Miles & Stockbridge P.C. on

On Thursday, June 29, 2017, Sens. Hatch and Markey introduced the “Promoting Good Cyber Hygiene Act” that would direct the National Institute of Standards and Technology (NIST) to establish a set of baseline voluntary best...more

466 Results
|
View per page
Page: of 19
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.