News & Analysis as of

Threat Management

Accelerynt, Inc.

You Passed the Test. But Can You Survive the Attack?

Accelerynt, Inc. on

“Life can only be understood backwards; but it must be lived forwards.” – Søren Kierkegaard - Most security programs are designed to pass a test. Policies are documented. Controls are mapped. Tools are deployed. And for a...more

StoneTurn

Assessing the Iranian Cyber Arsenal: Post “12 Day War” Threat to Your Company

StoneTurn on

As tensions flare in the Middle East, speculation is growing over the potential impacts of Iranian cyberattacks targeting US based companies and infrastructure. We saw similar reactions in 2020 following the death of the head...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Accelerynt, Inc.

Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration

Accelerynt, Inc. on

The Posture Visibility Problem - CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such as publicly accessible storage, unencrypted assets, and overly permissive...more

Guidepost Solutions LLC

The New Reality of Risk: Protecting Executives and Individuals in Today’s Political Climate

The tragic murder of two Israeli Embassy staffers in DC on May 21 is a sobering reminder that tensions between pro-Israel and pro-Palestine groups remain high after October 7, 2023. In the aftermath of that war, several...more

FordHarrison

[Webinar] How Vulnerable Are You? Identifying, Mitigating & Responding to Safety Threats In & Outside of Work - May 21st, 3:30 pm...

FordHarrison on

In a world where threats to our personal and professional safety are constantly evolving, how prepared are you and your clients—really? Join us for our webinar program, “How Vulnerable Are You? Identifying, Mitigating &...more

Mayer Brown

UK Weekly Sanctions Update - Week of March 31, 2025

Mayer Brown on

In this weekly update, we summarise the most notable updates in the UK sanctions world....more

Accelerynt, Inc.

Integrating CrowdStrike Alerts with Microsoft Sentinel: Streamlining Threat Visibility

Accelerynt, Inc. on

When Security Tools Don’t Talk to Each Other - Managing multiple security tools shouldn’t feel like juggling. But for many teams, that’s the reality—especially when their endpoint protection and SIEM don’t automatically...more

Alston & Bird

Emergence of Medusa Ransomware

Alston & Bird on

On March 12, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued a...more

Segal McCambridge

The Rise of Online Abuse in Collegiate Sports: Lessons from the NCAA Threat Matrix Pilot Study

Segal McCambridge on

Online abuse in sports has reached alarming levels, targeting athletes, coaches, and officials, especially during high-profile events. Recognizing the growing threat, the National Collegiate Athletics Association (NCAA)...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

California Law Allowing Employers to Get Workplace Violence TROs Covering Harassment Takes Effect January 1, 2025

California employers will soon be able to more easily obtain temporary restraining orders (TROs) to protect employees from harassment before conduct has escalated to acts of violence or credible threats of violence under a...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Mayer Brown

6 Strategies for Managing Enterprise Risk

Mayer Brown on

Today’s ever-changing global threat environment—shaped by factors including geopolitical upheaval, sanctions, cyberthreats and ransomware attacks, pandemics and natural disasters, and artificial intelligence and emerging...more

Nossaman LLP

White House Officials Want State Water/Wastewater Cybersecurity Plans Soon

Nossaman LLP on

In response to “multiple” cyber threat vectors, the Biden administration has asked governors of all 50 states to generate cybersecurity plans within 90 days (approximately July 1, 2024) to protect local water and wastewater...more

Nossaman LLP

White House Issues Dire Warning Regarding Drinking Water Supply and Wastewater System Cyberattacks

Nossaman LLP on

The Biden-Harris Administration is redoubling its efforts to improve cybersecurity for the nation’s water systems. In March, the EPA and the White House issued a dire warning to state governors alerting them of the need to...more

Robinson+Cole Data Privacy + Security Insider

CISA Alerts Manufacturers to Eliminate Default Passwords

On December 15, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) issued a Secure by Design Alert and guidance on “How Manufacturers Can Protect Customers by Eliminating Default Passwords.”...more

Hinshaw & Culbertson - Employment Law...

The 12 Days of California Labor and Employment Series – Day 9 "Expansion of Bases for Restraining Orders in the Workplace"

In the spirit of the season, we are using our annual "12 days of the holidays" blog series to address new California laws and their impact on California employers. On the ninth day of the holidays, my labor and employment...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part 2)

TNG Consulting on

As we learned in part one of this strategic planning series, strategic planning is a critical tool to help behavioral intervention and threat assessment teams (BIT) meet the mission, vision, and internal/external mandates of...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part I)

TNG Consulting on

Imagine, if you will, that you have survived a horrific plane crash on top of a snowy mountain. Littered next to you are pieces of the plane, limited supplies, and one other survivor coming in and out of consciousness. Your...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #378 – Bad Actors Selling Data of 23andMe Users of Ashkenazi Jewish and Chinese Descent

We previously reported on the unfortunate data breach suffered by 23andMe last month and its implications. We never imagined how horrible it could be....more

The Volkov Law Group

Maintaining Focus on Cyber Risks (Part II of IV)

The Volkov Law Group on

If you read about the world of hackers and cyber threats, you will quickly become numb to the creativity and variety of techniques that may threaten your organization.  Like all risks, however, the key is to consider...more

Ballard Spahr LLP

The Supreme Court Does Not Pose a “True Threat” to Defamation Law

Ballard Spahr LLP on

Summary - An opinion about a category of unprotected speech called “true threats” sheds light on how a majority of the justices may view New York Times v. Sullivan, a key defamation case. It also resolves a split over the...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Three Advisories for Industrial Control Systems

On May 16, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) released three advisories applicable to Industrial Control Systems (ICS). The Alerts cover vulnerabilities of Snap One OvrC Cloud, Rockwell...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Group Uses Communication System of University

Threat actors never cease to find innovative ways to extort their victims. If only threat actors would use their creativity for good causes....more

104 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide