News & Analysis as of

Encryption Passwords Cybersecurity

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Bass, Berry & Sims PLC

Privacy Peril: I’ll Take a (Chrome)Pass

We’ve spoken before of the need to make your website passwords some combination of complex, long, unusual, nonsensical, personally memorable, etc. For those of us who comply with those suggestions, but have an inflated...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Bass, Berry & Sims PLC

Privacy Perils: Password Quarantine Hygiene

Bass, Berry & Sims PLC on

Some have used the pandemic, and now the extended inclement weather, to learn to play a musical instrument, speak a new language or another new skill. If those are beyond any of your reasonable expectations, do not simply...more

Troutman Pepper

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

Association of Certified E-Discovery...

Coronavirus Home Office Security – Practical Tips for Securing Your “New” Home Office

I’ve been working as an independent consultant for quite some time. Along the journey, I’ve picked up many tips and tricks to maximize productivity while working from home with great results. There have been many articles...more

White & Case LLP

Cybersecurity and the UK legal landscape

White & Case LLP on

As businesses continue to digitise their assets and operations, the need to continually assess IT infrastructure and the technical measures in place to safeguard key information assets and data becomes ever more important....more

Bass, Berry & Sims PLC

Privacy Perils: Til Death Do Us Part

Bass, Berry & Sims PLC on

Much has been written – and hopefully read – on securing your passwords from disclosure. But what about when you want or need your passwords located? Failing to make proper (and secure) arrangements for your passwords to be...more

Bass, Berry & Sims PLC

Privacy Perils: Protecting Data While on the Road

Bass, Berry & Sims PLC on

When the world’s cyber-security experts meet at the largest computer security conference in Las Vegas, many of them leave their regular devices at home and either forgo electronics all together or bring burner phones and...more

Robinson+Cole Data Privacy + Security Insider

UK Information Commissioner’s Office Issues Guidance on Use of Encryption and Passwords in Connection with GDPR

The “security principle” under the General Data Protection Regulation (GDPR) requires that organizations process personal data securely by means of “appropriate” technical and organizational measures....more

Bass, Berry & Sims PLC

Privacy Perils: Password Managers

We've harped on the importance of strong passwords several times, and hopefully we are all practicing those tips. Many of us have dozens of online accounts, and while it's tempting to use the same password across the board...more

Steptoe & Johnson PLLC

Use This Checklist to Assess Your Cybersecurity Preparedness

Steptoe & Johnson PLLC on

When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more

Snell & Wilmer

Data Privacy Day? Yep, it’s a Thing.

Snell & Wilmer on

For a number of years now, January 28 has been marked as “Data Privacy Day” (or, for our European friends, “Data Protection Day”), and it is often overlooked observed in the United States, Canada, India and many European...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

Pillsbury - Internet & Social Media Law Blog

LinkedIn Grapples with the Ripples of a 2012 Data Breach

Last week on the official LinkedIn blog, the company’s chief information security officer, Cory Scott, reported the company had become aware of an additional set of data that has just been released consisting of e-mail and...more

Kilpatrick Townsend & Stockton LLP

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Manatt, Phelps & Phillips, LLP

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

Sands Anderson PC

Is Your Cyber-Security Better Than a Fortune 500's?

Sands Anderson PC on

Half of Fortune 500 companies would face “serious harm” or be “adversely impacted” by a cyber-attack. The greatest perceived harms are loss or theft of confidential information, loss of reputation and direct loss from...more

Mintz - Privacy & Cybersecurity Viewpoints

NIST Issues Guidelines on Mobile Security

The National Institute of Standards and Technology (NIST) has issued guidelines to help federal agencies manage and secure mobile devices used by their employees for government business....more

Cohen & Gresser LLP

Encryption is Key to Limiting Company Exposure for Data Security Breaches

Cohen & Gresser LLP on

Companies doing business in California may find themselves targeted for investigation if they fail to encrypt personal information, according to a recent report issued by the California Attorney General’s office. ...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide