Latest Posts › Cybersecurity

Share:

Ransomware Reckoning – The New Bill Changes the Game

The Intelligence Authorization Act for Fiscal Year 2025 (S.4443) is a bold legislative step in addressing ransomware as a critical threat. The act’s provisions, from elevating ransomware to a national intelligence priority to...more

Balancing Act: Industry Concerns Over CISA’s Proposed Cyber Incident Reporting Rule

As discussed in our previous blog post, the Cybersecurity and Infrastructure Security Agency (CISA) is proposing a significant new rule to bolster the nation’s cyber defenses through mandatory incident reporting. While...more

Mandatory Cybersecurity Incident Reporting: The Dawn of a New Era for Businesses

A significant shift in cybersecurity compliance is on the horizon, and businesses need to prepare. Starting in 2024, organizations will face new requirements to report cybersecurity incidents and ransomware payments to the...more

Network Topology and Network Mapping: The NIST Cybersecurity Framework – Part 2

A previous installment discussed the centrality of network topology to an organization’s data security and outlined the legal framework and obligations incumbent upon many organizations in the U.S. The first installment can...more

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

How Smart Is Your Artificial Intelligence Policy?

There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more

The Imperative of Cyber Preparedness: The Power of Tabletop Exercises

In an age where digital connectivity is rapidly advancing, cybersecurity has become an inescapable concern for organizations across industries. With cyber threats ranging from data breaches to ransomware attacks, it is...more

Cybersecurity Risks to AI Adoption in Construction

The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more

Tabletop Exercises as Risk Mitigation Tools

As cyber threats have evolved and expanded, cybersecurity has emerged as a threat to organizations across sectors, and there is more urgency than ever for companies to remain vigilant and prepared. Cybersecurity incidents can...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 3

The third and final installment of this three-part series discusses the construction industry’s evolving landscape and the challenges it faces in the realm of cybersecurity, revealing how a comprehensive, data-centric...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 2

In today’s digital era, the construction industry faces a growing threat from cyber risks that can have significant impacts on projects and operations. As technology continues to revolutionize the industry, it is crucial for...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 1

The construction industry’s rapid digital transformation has opened the door to new cybersecurity challenges. As the sector adopts innovative technologies like cyber-physical systems, Building Information Modeling (BIM), and...more

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide