News & Analysis as of

Vulnerability Assessments Data Security Software

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #373 – If you Use Windows Copilot —Configuration Update Issued by Microsoft This Week

On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2  (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more

Accelerynt, Inc.

Best Patch Management Strategy for Remote Workers

Accelerynt, Inc. on

Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more

Jenner & Block

Evolving Caremark Duties Related to Cybersecurity Risks

Jenner & Block on

In the recent case Construction Industry Laborers Pension Fund on behalf of SolarWinds Corporation, et. al v. Mike Bingle, et al. (2022), the Delaware Chancery Court considered whether the directors of SolarWinds Corporation,...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Microsoft Issues Emergency Software Update for PrintNightmare Zero Day Vulnerability - Following the release of a U.S. Cybersecurity & Infrastructure Security Agency (US-CERT) Coordination Center...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Patch Tuesday Includes Six Zero Day-Related Vulnerabilities

IT professionals leave room in their schedules for Microsoft’s monthly Patch Tuesday just as I leave room in my schedule every Wednesday night for blog writing. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #170 – Patch: Business + Personal

In this week’s New + Now piece, we discuss the importance of patching software vulnerabilities and being patient at work to allow your data security colleagues to patch those vulnerabilities, which are coming more frequently...more

Robinson+Cole Data Privacy + Security Insider

Spectre And Meltdown Vulnerabilities Affect Processors In Wide Range of Computing Devices

This week, the world learned of widespread and serious vulnerabilities in most central processing units (CPU). CPUs manage the instructions received from the hardware and software running on a computer. The vulnerabilities,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #99 – If you are an IoT Fanatic, this App is for You

Last January, the Federal Trade Commission (FTC) launched the IoT Home Inspector Challenge, a contest that requested participants to come up with a tool that would identify security issues that are caused by out-of-date...more

Orrick, Herrington & Sutcliffe LLP

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide