News & Analysis as of

Vulnerability Assessments Cyber Insurance

Ogletree, Deakins, Nash, Smoak & Stewart,...

Business Email Compromise Scams: What They Are, and How to Avoid Them

In an increasingly digital world, the rise in cybercrime involving email scams has become a significant threat to individuals and organizations alike. These sophisticated attacks exploit human psychology and technological...more

Foley & Lardner LLP

Recommendations for Managing Cybersecurity Threats in the Manufacturing Sector

Foley & Lardner LLP on

In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more

Butler Snow LLP

Cybersecurity: What Businesses Need to Know

Butler Snow LLP on

Cybersecurity is a top concern for all industries, particularly for the pharmaceutical and medical device industries. These industries hold some of the most sensitive data and highly valuable technology, making them prime...more

Latham & Watkins LLP

Cyber Security Incidents als Herausforderung für die Rechtsabteilung - wichtigste Punkte, die Unternehmensjuristen über die...

Latham & Watkins LLP on

Hackerangriffe, Datendiebstahl, Ransomware, Datenpannen und sonstige Cybersecurity Incidents werden immer mehr zu einem zentralen Unternehmensrisiko. Dabei wird oft übersehen, dass dieses Thema nicht nur in technischer,...more

Kramer Levin Naftalis & Frankel LLP

The Diligence Process for Privacy and Data Security: Telltale Indicators of a Data Program’s Strengths and Weaknesses

The rapid expansion of data security and privacy laws and regulations — both in the United States and internationally — harbors the potential for substantial liability, with the consequence that cyber compliance has become an...more

Snell & Wilmer

Cybersecurity on Your Project: Why Not Follow National Security Strategy?

Snell & Wilmer on

In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide