News & Analysis as of

Vulnerability Assessments Data Protection

Privacy Tip #122 – What’s Up with WhatsApp’s Security Flaws?

WhatsApp has been applauded for adding end-to-end encryption on its platform to secure conversations of its users two years ago. But encryption has its challenges, despite its security posture....more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

Plaintiffs’ Lawyer Predicts $1 Billion Settlement in Data Breach Case – But Where’s the “Harm”?

by Orrick - Trust Anchor on

This week, a high profile plaintiffs’ firm (Edelson) stated that “if done right,” the data breach class actions against Equifax should yield more than $1 billion in cash going directly to more than 143 million consumers...more

OCIE Lessons From Cybersecurity 2 Initiative

by Carlton Fields on

On August 7, the SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a risk alert containing observations from its Cybersecurity 2 Exam Initiative. As a follow-up to the 2014 Cybersecurity 1 initiative, the...more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Funds Talk: May 2017 - CFTC Among Regulators Demanding Cybersecurity Vigilance

While the Securities and Exchange Commission (SEC) has garnered significant attention for its increased efforts and focus on regulating and enforcing enhanced cybersecurity measures within the U.S. financial markets, the...more

Global Cybersecurity Threats to the Maritime Sector

by Holland & Knight LLP on

Cybersecurity risks to the nation's critical infrastructure (CI) – defined as 16 CI sectors, including transportation and maritime – continue to grow exponentially. The incoming Trump Administration has made it clear that...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

by Baker Donelson on

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

“Bug Bounty” Programs Grow In Popularity

by King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

OPM data breach update: OPM shuts down background check system

The OPM announced this week that it is temporarily shutting down its background security clearance system, e-QIP, as vulnerabilities were found during a review of systems. Presently, according to OPM, the vulnerabilities did...more

10 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.