Latest Posts › Cybersecurity

Share:

State Data Breach Notification Laws

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

Global Ransomware Attack: Preparation is Key

Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more

NY Financial Services Companies’ 2017 Resolution: Cybersecurity

The New York State Department of Financial Services (DFS) made headlines back in late September with a “first-in-the-nation” piece of legislation aimed at mandating specific cybersecurity protocols for banks, insurance...more

California Amends Definition of Personal Identifiable Information and Breach Notification Content Requirements

On October 6, 2015, California Governor Jerry Brown signed into law several changes to California’s Data Breach Notification Statute. The law, as amended, adds additional categories of information into the definition of...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

Phishing and Spear Phishing: Modern Methods Applied to Age-Old Social Engineering

It may surprise many who have observed the recent media attention of data breaches to learn that in the world of Cybersecurity, sometimes it’s the oldest attacks that find new life when they are applied in new ways. Phishing...more

Is Your Refrigerator Spying on You?

Door locks, cameras, fitness bracelets, home security, thermostats, refrigerators, utility meters, light bulbs, and cars. The list of the things and devices that can collect information about you and send it into the big...more

White House Proposes Series of New Cybersecurity Laws and Initiatives

“If we’re going to be connected, we’ve got to be protected.” With those words President Barack Obama unveiled new consumer privacy legislation and new cybersecurity and privacy partnerships between the federal government and...more

Florida Overhauls Its Data Security Breach Notification Law Effective July 1, 2014

On June 20, 2014 Governor Rick Scott approved the Florida Information Protection Act of 2014, overhauling the requirements and steps companies must follow when faced with a potential or actual security breach resulting in the...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide