News & Analysis as of

NSA Cybersecurity

$10 domain name halts spread of WannaCry ransomware

by Hogan Lovells on

A major global ransomware attack going by the name of WannaCry was recently short circuited by the registration of a single domain name costing just over $10. The unregistered domain name consisting of random characters was...more

WannaCry: What to Know and What to Do

by Snell & Wilmer on

On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world. It set off alarms globally, and so far has infected over 200,000 computers across more...more

WannaCry: The Global Ransomware Attack

by Jones Day on

A new and widespread ransomware attack is affecting institutions around the world, with reports of hundreds of thousands of infections in nearly 150 countries, including the United States, United Kingdom, Spain, Russia,...more

Ransomware: How to Avoid It and What to Do If You Have Been Hit

by Perkins Coie on

Computer systems around the world have been impacted by the largest cyber-extortion attack in history. According to news reports, the “ransomware” attack hit more than 200,000 victims in 150 countries since it started on...more

Global Ransomware Attack: Preparation is Key

by Foley & Lardner LLP on

Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more

Ransomware Makes You Wanna Cry: Cybersecurity Trends

by CloudNine on

This must be our month for ransomware stories.  Unless you have been living under a rock for the past several days, you’ve undoubtedly heard about the WannaCry virus that has been attacking Microsoft© Windows machines without...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

Global Cybersecurity, Surveillance, and Privacy: The Obama Administration’s Conflicted Legacy

In the wake of Edward Snowden’s disclosures, the United States administration faced a daunting series of challenges on surveillance, cybersecurity, and privacy. Congress was reluctant to enact comprehensive legislation....more

Blame Hollywood: A Conversation with Stewart Baker, former General Counsel of the National Security Agency

by Poyner Spruill LLP on

Editor's Note: In the world of cyber law, privacy and cybersecurity, one of the largest and most colorful figures is Stewart Baker, whose resume includes a stint as General Counsel at the National Security Agency and...more

The State of Cybersecurity in 2016 and the (potential) Great Cyber Fire

Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more

What the Shadow Brokers Affair Means For A Cyber Future

by Poyner Spruill LLP on

It could have been a Bond trailer, complete with the dramatic intro “In a world where there are no secrets….” But this is real. On Monday, a mysterious group calling itself the Shadow Brokers released files apparently swiped...more

Safe Harbor in Troubled Waters

by Nossaman LLP on

On Tuesday, February 2, 2016, the United States and the European Union announced a new transatlantic “safe harbor” data transfer deal that would allow companies with significant online operations to continue to transfer data...more

Brussels Regulatory Brief: September/October

by K&L Gates LLP on

On 11 September, TeliaSonera and Telenor have abandoned the proposed merger of their business units in Denmark. The contemplated transaction would have resulted in the establishment of a joint venture active in the provision...more

EU safe harbor update

Last week, the Vienna Higher Regional Court ruled that most of Max Schrems’ claims against Facebook can proceed, including his claim that Facebook improperly allowed his personal information to be shared with the National...more

Whom Should You Suspend During an Internal Investigation?

by Thomas Fox on

Whom to suspend during any Foreign Corrupt Practices Act (FCPA) investigation is always a delicate question to answer. Unfortunately there is never an easy answer. As the Volkswagen (VW) emission-testing scandal continues to...more

EU Strikes Down the Safe Harbor Framework for Transatlantic Data Transfers: What You Should Know and What to Do Next

by Stinson Leonard Street on

The European Court of Justice has declared invalid the Safe Harbor data-transfer agreement that has governed EU data flows across the Atlantic for the last 15 years. Thousands of U.S. companies have relied on the Safe Harbor...more

EU safe harbor update

A lot has happened since the European Court of Justice’s declaration that the EU-US safe harbor framework is invalid. First, the Article 29 Working Party, an organization comprised of representatives from each data...more

US-EU Data Privacy Safe Harbor Program Invalidated

by Cohen & Grigsby, P.C on

On October 6, 2015, the European Court of Justice ("ECJ") invalidated the safe harbor program negotiated between the United States Department of Commerce and the European Commission pursuant to which safe harbor-registered...more

EU Working Party Issues Statement on CJEU's Invalidation of Safe Harbor Framework

The European Court of Justice's (CJEU) recent decision striking down the EU-US Safe Harbor framework has created significant marketplace uncertainty and left companies scrambling for alternative cross-Atlantic data transfer...more

Compliance at the Tipping Point, Part V – Protection Afforded From a Compliance Program

by Thomas Fox on

Today, I wrap up my series on why I think compliance is at the Tipping Point. However as it is a Friday in October, I continue my tribute to the Man in the Shadows, producer Val Lewton, whose films for RKO had some of the...more

The “Other” Safe Harbor: OIG Warns Healthcare Providers and Vendors Against Information Blocking and Federal Anti-Kickback...

by Cozen O'Connor on

For those of us who work in the privacy and security space this past week has been a whirlwind with focus on the ramifications of the European Court of Justice (ECJ) decision invalidating the EU-U.S. Safe Harbor Agreement....more

Means, Other Than Safe Harbor, of Transferring Personal Data to the U.S. Potentially Vitiated?

by McGuireWoods LLP on

After the decision of October 6, 2015, of the Court of Justice of the EU (CJEU) invalidating the decision from the EU Commission (Decision 2000/520) on the Safe Harbor, transfer of personal data to the U.S. based on Standard...more

Important Decision On Applicable Data Protection Law

by Allen & Overy LLP on

After the controversial Google Spain decision (which besides the right to be forgotten also dealt with applicable law rules), the Court of Justice of the EU (CJEU) handed down another important – and yet again rather...more

Compliance at the Tipping Point, Part IV – The Schrems Decision

by Thomas Fox on

I continue my exploration of why I believe that compliance is at the Tipping Point, with today’s entry of data point four, which is last week’s decision by the European Court of Justice (ECJ) in the Schrems case. While most...more

Privacy, Security, Risk: What You Missed At IAPP Conference

by Orrick - Trust Anchor on

Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more

77 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.