News & Analysis as of

Passwords

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Stange Law Firm, PC

Avoiding digital pitfalls during divorce and family law cases

Stange Law Firm, PC on

In today’s digital age, email and social media accounts often contain important personal information — and sometimes evidence — in divorce and family law matters. While it may be tempting to access certain accounts or...more

Carlton Fields

No Password Required: CISO at RSA and Champion of a Passwordless Future

Carlton Fields on

Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

K2 Integrity

‘Tis The Season To Shop Cyber Smart: Holiday Risks To Organizations And Employees

K2 Integrity on

During the holiday season, online shopping sites advertise big sales to draw consumers onto their sites. Distracted by low prices and expedited shipping times, shoppers often forget to take a moment to think about security....more

Sheppard Mullin Richter & Hampton LLP

The Ghost of Employees Past: The Data Breach Risks from User-Credential Management

A recent settlement with an education service provider and three states – California, Connecticut, and New York – serves as a reminder to deactivate the credentials of departed employees. The case arose following a data...more

WilmerHale

Readily Ascertainable - WilmerHale's Trade Secret Bulletin: October 2025

WilmerHale on

Welcome to WilmerHale’s bulletin on recent trade secret case law and relevant news items. This month, we cover decisions affirming a large verdict for trade secret misappropriation, upholding a ruling that passwords are...more

FordHarrison

EntertainHR: What We Can Learn About Security from the Louvre Heist

FordHarrison on

The heist was over in eight minutes. You know which one. In an age of cyber threats and digital scams, two robbers stole priceless jewels in the most analog way. The pair broke into the Louvre in broad daylight using a truck...more

Foley Hoag LLP - Security, Privacy and the...

Lessons on Protecting Your Company’s Crown Jewels – Do a Better Job than the Louvre Did Protecting Its Crown Jewels

The Louvre is synonymous with cultural excellence. That’s what makes the recent heist of crown jewels—and the subsequent state audit—so jarring. This wasn’t a Hollywood caper. It was a case study in how predictable,...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking

The U.S. Court of Appeals for the Third Circuit recently ruled that violations of employers’ computer access policies do not constitute violations of the federal Computer Fraud and Abuse Act (CFAA) and that account passwords...more

Freeman Mathis & Gary

Third Circuit rules that an employer’s passwords are not “trade secrets”

Freeman Mathis & Gary on

An employer’s passwords may protect valuable information, but the passwords themselves lack independent economic value and thus fail to qualify as “trade secrets” under the Defend Trade Secrets Act. Understanding trade...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity Awareness Month: Protecting people, data, business integrity

October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more

Proskauer - New Media & Technology

Two Notable Tech Law Decisions That Closed Out the Summer: CDA Immunity Protections for a Software Platform, CFAA “Authorized...

In the closing days of August, two federal appeals courts issued noteworthy decisions at the intersection of workplace conduct, computer law and online platforms. The two opinions were released during a period of time this...more

K2 Integrity

Cybersecurity Awareness Month: Identifying And Avoiding Phishing Attacks

K2 Integrity on

Cybersecurity Awareness Month was established to provide resources to organizations and their employees to help them stay safer and more secure online. It is an opportunity to focus on four key behaviors: creating strong...more

Baker Donelson

Cybersecurity Awareness Month 2025: Seven Foundational Pillars of Good Personal Cyber Hygiene

Baker Donelson on

Deepfakes, social engineering, and urgent texts or calls from your IT department all continue to be effective methods hackers use to gain access to your most important accounts and assets. October is Cybersecurity Awareness...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #463 – How a Weak Password Can Take a Whole Company Down

Passwords are the key to your digital kingdom. Passwords, also known as “credentials,” provide the user with access to all information and data that the user has been authorized to access, whether in a personal or...more

Carlton Fields

No Password Required: Starbucks’ Security Pro Went From Cyber Competitions to Corporate Red Teaming

Carlton Fields on

DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in...more

WilmerHale

Readily Ascertainable - WilmerHale's Trade Secret Bulletin: August 2025

WilmerHale on

Welcome to WilmerHale’s bulletin on recent trade secret case law and relevant news items.  We’ve affectionately nicknamed it “Readily Ascertainable” because, unlike a trade secret, it should be easy to figure out....more

Warner Norcross + Judd

Navigating a Loved One’s Digital Life After They Pass

Warner Norcross + Judd on

We all expect to feel grief and sadness after the loss of a loved one. What many people don’t anticipate is the sudden burden of administrative tasks that follow death, from bills to be paid and accounts to be closed. In the...more

Shook, Hardy & Bacon L.L.P.

Ransomware Attacks Target SonicWall Firewall Vulnerability

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more

Schwabe, Williamson & Wyatt PC

Agencies Release Actionable Guidance on Play Ransomware

The United States Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have issued an...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

Robinson+Cole Data Privacy + Security Insider

Phishing Attacks – Anyone Can Get Pwned

HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #430 – GrubHub Confirms Security Incident Through Third Party Vendor

If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more

Ankura

The Evolution of Password Management

Ankura on

In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more

521 Results
 / 
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide