News & Analysis as of

Data Management Cybersecurity Cyber Attacks

Troutman Pepper

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Association of Certified E-Discovery...

[Webinar] Mastering Information Governance: Strategies for Effective Data Management in the Evolving World of Cybersecurity - June...

Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more

J.S. Held

2024 J.S. Held Global Risk Report: New Laws Addressing the Risks and Rewards of Artificial Intelligence (AI)

J.S. Held on

The race to develop AI and calls to regulate it are heating up around the world. In November 2023, 28 countries, including the United States, United Kingdom, China, and the European Union, met and pledged to work together to...more

Pillsbury - Propel

Privacy Breach: The Silent Killer of Startups

Pillsbury - Propel on

A privacy breach can have detrimental consequences for startups:  A privacy breach may trigger legal consequences and regulatory scrutiny, especially for a startup that operates in areas with stringent data protection laws...more

Health Care Compliance Association (HCCA)

BA Depicted by OCR as Example of Ransomware Dangers Recovered Quickly, Didn’t Expect Fine

Report on Patient Privacy 23, no. 11 (November, 2023) Tim DiBona clearly remembers Christmas Eve 2018 when the staff of his small firm—Doctors’ Management Service (DMS)—arrived at their West Bridgewater, Mass., office to...more

Health Care Compliance Association (HCCA)

Privacy Briefs: November 2023

Report on Patient Privacy 23, no. 11 (November, 2023) The American Hospital Association (AHA) is urging federal lawmakers to intervene with the HHS Office for Civil Rights (OCR) so that hospitals and health systems can...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

J.S. Held

Critical Issues in Cyber Incident Response: What Happens After a Ransom Payment is Made

J.S. Held on

Ransomware trends – specifically related to frequency, cost, and payout – should no longer surprise us. We depend on technology more and more, integrating it into every aspect of our lives. As for data management, there is...more

Onna Technologies, Inc.

[Webinar] Declutter Your Data: Strategies for Efficient Data Retention & Risk Reduction - October 25th, 1:00 pm - 2:00 pm ET

In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #371 – Internet Safety Guide for Seniors

I was talking to a client today about a security incident and the discussion turned to how threat actors are using increasingly more sophisticated ways to attack individuals and companies. She lamented that we know more than...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Stinson - Corporate & Securities Law Blog

SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies

The SEC adopted final rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2023 #2

Robinson & Cole LLP on

CYBERSECURITY - Clop Claims Zero-Day Attacks Against 130 Organizations - Russia-linked ransomware gang Clop has claimed that it has attacked over 130 organizations since late January, using a zero-day vulnerability in...more

Tenace

Protecting Confidentiality: The Urgent Need for Strong Cybersecurity in Law Firms

Tenace on

Law firms are one of the most attractive targets for cybercriminals, making strong cybersecurity a critical concern for these organizations. With confidential client information, sensitive legal documents, and valuable...more

Polsinelli

Cyber Incident Reporting for Critical Infrastructure Act: Significant Changes to Incident Reporting Are on the Horizon

Polsinelli on

In May 2021, Colonial Pipeline, a privately held oil pipeline responsible for nearly half of the oil supply for the U.S. East Coast, was crippled by a DarkSide ransomware attack. DarkSide is widely believed to be a...more

Robinson+Cole Construction Law Zone

Cyber Insurance for the Construction Industry

Cyber-crime is an increasingly prominent threat to many industries, and construction is no exception. With the growing use of digital technologies in what was once a primarily “offline” industry, cyber-attacks can pose a...more

Array

New Year’s Resolutions for Legal Teams.

Array on

January is a time where many individuals implement new goals or strategies for success. This piece will take a goals style approach to explore how a litigation support partner can improve a legal team’s efficiency,...more

Nelson Mullins Riley & Scarborough LLP

When It Comes to Cybersecurity: Be Prepared!

As has been the trend for some time now, organizations across all industries and sectors are increasingly at risk of being targeted by bad actors online. Now, the adage espoused by IT security professionals is to prepare for...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2022 - #3

Robinson & Cole LLP on

CYBERSECURITY - CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and...more

Polsinelli

Cybersecurity Awareness Means, at a Minimum, Doing the Basics (Again and Again)

Polsinelli on

On September 30, 2022, the White House kicked off Cybersecurity Awareness Month by reminding citizens of the impacts cyberattacks can have on critical infrastructure such as “electric grids and fuel pipelines … and many other...more

Akerman LLP

Cybersecurity and Privacy Risks for the Construction and Real Estate Industries

Akerman LLP on

The construction industry has experienced an amazing evolution in recent years thanks to the rapid adoption of new technologies. While all of this new technology has the potential to make companies more productive and more...more

Dechert LLP

Dechert Cyber Bits - Issue 17

Dechert LLP on

California Privacy Protection Agency Proposes CPRA Regulations as the ADPPA Continues to Advance in Congress - On July 8, 2022, the California Privacy Protection Agency (“CPPA”) filed a Notice of Proposed Rulemaking...more

Bilzin Sumberg

Is Reporting Cyber Breaches to the Federal Government Required or Encouraged?

Bilzin Sumberg on

President Joe Biden signed the Strengthening American Cybersecurity Act into law on March 15.  Among other requirements, companies that are “covered entities” must report data breaches promptly to federal regulators.  For...more

Robinson+Cole Data Privacy + Security Insider

ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022

ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device Evaluation group, “the Top 10 Health Technology Hazards list identifies the potential sources of danger...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide