News & Analysis as of

Supply Chain Data Breach

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

Parker Poe Adams & Bernstein LLP

Key Lessons for Cybersecurity and IT Leaders From Judge's Recent Fraud Decision in SEC Case Against SolarWinds

On July 18, a New York federal judge threw out most of the SEC’s claims brought against both SolarWinds Corp. and the company’s chief information security officer (CISO), Timothy Brown....more

Foley & Lardner LLP

What Goes Around Comes Around: The Resurgence of Data Breach Class Actions

Foley & Lardner LLP on

Data breach class actions are again on the rise, with a recent report by Lex Machina confirming what many cybersecurity practitioners have seen first-hand over the last two years. The findings also reaffirm longstanding best...more

Foley & Lardner LLP

Rolling With the Punches in a Networked World: CCOE Cybersecurity Panel Discussion

Foley & Lardner LLP on

Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more

Warner Norcross + Judd

AirBoss Looms Large as Stellantis Loses Bid for an Injunction

Warner Norcross + Judd on

The Michigan Supreme Court’s July 2023 decision in MSSC, Inc v AirBoss Flexible Prods Co renewed many suppliers’ ammunitions in customer negotiations. One OEM, however, has been publicly pushing back against those arguments,...more

K&L Gates LLP

Doing Business in Australia

K&L Gates LLP on

Australia welcomes new business and foreign investment by providing a strong economy, a stable political environment and a skilled and talented workforce. Our comprehensive guide to Doing Business in Australia has been...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Mayer Brown

EU Cyber Legislation Puts Emphasis on Board Responsibility

Mayer Brown on

What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more

Mitratech Holdings, Inc

Aligning your cyber risk management program with your company’s bottom line

The key to gaining buy-in for your cyber risk roadmap under tightening budgets and staffing challenges. This statement should come as no surprise: there’s been an alarming rise in the number and sophistication of cyber...more

Jackson Lewis P.C.

Dealing With the Growing Threat of Cyberattacks in Manufacturing Sector: What Employers Need to Know

Jackson Lewis P.C. on

For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Foley & Lardner LLP

Product Liability Trends in the Automotive Industry

Foley & Lardner LLP on

Automobiles may be the most complex, essential and widely used consumer products in the world and every year they incorporate increasingly advanced technology into nearly every component and function. The advancing...more

Venable LLP

Congressional, Executive, and Legal Developments for Government Contractors to Consider - March 2023

Venable LLP on

Each month, Venable's Government Contracts Group publishes a summary of recent legal developments of interest to the government contractor community. ...more

Ankura

How to Close the Cybersecurity Skills Gap: Collaboration, Creativity, and Education

Ankura on

The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more

Ankura

Trends and Moments that Defined 2022 & Predictions for 2023

Ankura on

While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more

Array

Cybersecurity and eDiscovery: What you need to know about your vendor

Array on

Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more

Ankura

Emerging Middle Market Cyber-Attack Vectors: Are You at Risk?

Ankura on

The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more

Dunlap Bennett & Ludwig PLLC

Supply Chain Vulnerability in the Healthcare Industry

The healthcare industry possesses invaluable data in the forms of patient health information, personal identifying information, and payment card information. The industry is a treasure trove of information to be exploited by...more

Arnall Golden Gregory LLP

Contracting for Supply Chain Cybersecurity: Recent Report Provides Insight on Best Practices

Introduction - Enterprises are increasingly reliant on complex and interconnected ecosystems of technology solutions. Companies are reducing their dependence on the legacy monolithic highly customized solutions, instead...more

Mintz - Antitrust Viewpoints

5th Circuit Confirms Avanci SEP Pool is Safe: No Antitrust Issue with Avanci’s Pool

Avanci’s pool retains its 5th Circuit win, in a slightly different way, after an unusual turn of events where the panel rescinded its prior opinion and issued a new one. The new opinion affirms the district court’s ruling...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 3, Issue 2

BioPlus Specialty Pharmacy Faces Lawsuit Over Healthcare Data Breach - "Florida-based BioPlus Specialty Pharmacy allegedly failed to safeguard PII and notify patients of a healthcare data breach that impacted 350K, the...more

Woodruff Sawyer

Looking Ahead to 2022 Cyber Insurance Expectations For The Coming Year

Woodruff Sawyer on

1.0 CYBER MARKET UPDATE - 1.1 US Market Update - To call 2021 anything other than a sea change in the cyber insurance world would be an understatement. Indeed, nearly all cyber insurance renewals saw increases in...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Hackers Focus on Downstream Vendors as Next Victims

In a blog post entitled “New activity from Russian actor Nobelium,” Microsoft’s V.P. of Customer Security & Trust Tom Burt discussed a recent alert issued by the Microsoft Threat Intelligence Center (MSTIC) regarding the...more

Bass, Berry & Sims PLC

Privacy Peril: One Weak Link

Bass, Berry & Sims PLC on

On October 8, Data Breach Today reported that Syniverse, a company that routes calls and text messages for 95% of the world’s top mobile carriers to the tune of 1 trillion (yes, trillion) messages a year, has disclosed it...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

[Webinar] Privacy, Data and Cyber Security: The Current Legal Landscape - November 11th, 12:00 pm - 1:00 pm EST

Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more

67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide