News & Analysis as of

Security Controls Cybersecurity

Ankura

Common Causes of CFIUS Agreement Non-Compliance and Enforcement Risk

Ankura on

Following the update to the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) Enforcement and Penalty Guidelines, the Committee has continued to signal its intention to more heavily leverage...more

Pillsbury Winthrop Shaw Pittman LLP

Department of Defense Delivers Highly Anticipated CMMC Proposed Rule

The proposed rule requires contractors to make annual affirmations regarding their cybersecurity maturity, thus increasing their risk of False Claims Act Liability. The proposed rule allows for limited use of Plans of...more

McDermott Will & Emery

DoD Rings in 2024 With Proposed Cybersecurity Maturity Model Certification Rule

McDermott Will & Emery on

On December 26, 2023, the US Department of Defense (DoD) published its long-awaited proposed rule codifying the Cybersecurity Maturity Model Certification (CMMC) Program. The proposed CMMC rule will apply to all DoD...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Hinshaw & Culbertson - Consumer Crossroads

Cybersecurity Compliance Emphasized at MBA's Legal Issues and Regulatory Compliance Conference

With cybersecurity legislation and regulation sweeping the country in response to a series of high-profile hacking and ransomware attacks, it was little surprise that cybersecurity was a topic at the recently concluded...more

Harris Beach PLLC

New York’s Department of Financial Services Urges Cyber Insurance Companies to Require Insureds to Implement Robust Cybersecurity...

Harris Beach PLLC on

The New York State Department of Financial Services (DFS) issued a letter to the cyber insurance community on February 4, 2021 that should signal a warning to many other businesses seeking to obtain or keep their...more

Partridge Snow & Hahn LLP

Bringing Your Business Online: Written Information Security Programs (WISPs)

The current COVID-19 pandemic has forced many businesses online in order to survive. In many cases, businesses had no plans to be online. Others were forced to move online more quickly than planned. In order to assist these...more

Stinson - Government Contracting Matters

U.S. Government Issues Alert Regarding Critical Windows 10 Update – Are You Entitled To Compensation?

Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more

Stinson LLP

NIST Updates SP 800-171 To Enhance DoD Contractor Security Against Cyber Attack

Stinson LLP on

Cybersecurity continues to be an imperative for the protection of the Department of Defense (DoD) and its contractors' supply chain. On June 19, 2019, the National Institute of Standards and Technology (NIST) issued two draft...more

Sheppard Mullin Richter & Hampton LLP

Ohio Gives Breach Safe Harbor for Companies with Written Data Security Program

Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Don't Ignore Privacy and Data Security: Pre-Deal and Negotiation Considerations for Buyers in Merger and Acquisition Transactions

Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more

Ballard Spahr LLP

OIG reports on CFPB’s public website security controls

Ballard Spahr LLP on

The Office of Inspector General for the Fed and CFPB has completed a report setting forth its findings from an audit in which it evaluated “selected security controls for protecting the [CFPB’s] consumerfinance.gov website...more

King & Spalding

California Attorney General Interprets “Reasonable” Data Security

King & Spalding on

On February 16, 2016, California Attorney General Kamala Harris released guidance defining the minimum level of data security measures organizations should enact to comply with state laws governing the protection of personal...more

Cooley LLP

Alert: Reasonable Security Defined: California Attorney General's 2016 Data Breach Report

Cooley LLP on

On February 25, 2016, the Office of the California Attorney General released its 2016 California Data Breach Report, which contains a compilation and analysis of the information provided to the Attorney General pursuant to...more

Robinson+Cole Data Privacy + Security Insider

Information Security: MBA Whitepaper

Recently, the Mortgage Bankers Association released “The Basic Components of an Information Security Program,” for small and medium size companies in the mortgage industry that may not have the resources to stay well-informed...more

King & Spalding

California State Auditor Report Reveals Weaknesses In Golden State’s Information Systems

King & Spalding on

Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more

PilieroMazza PLLC

Not So Far Out: OMB Memo Indicates Cybersecurity FAR Clauses Are Coming Soon

PilieroMazza PLLC on

On August 11, 2015, the Office of Management and Budget (“OMB”) released a draft policy memo entitled “Improving Cybersecurity Protections in Federal Acquisitions.” The purpose of the memo is to provide federal agencies with...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide