News & Analysis as of

Information Technology Network Security

Mayer Brown

Key forthcoming EU legislation on Cybersecurity, Artificial Intelligence, Data and Digital Markets

Mayer Brown on

NETWORK AND INFORMATION SECURITY 2 DIRECTIVE (NIS2) - WHO WILL BE IN SCOPE? Operators of essential and important services across various sectors including energy, transport, banking, health, medical devices, chemicals...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Integreon

Top Five Considerations When Responding to a Cyber Breach

Integreon on

When a cyber breach occurs, cooler heads need to prevail.  This can be a highly emotional and stressful occurrence.  Being prepared and having a clear plan of action will help you stay focused, meet your compliance...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #373 – If you Use Windows Copilot —Configuration Update Issued by Microsoft This Week

On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2  (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #367 – Update your Apple Operating System to 16.6 NOW

On Monday, July 24, 2023, Apple issued a security update to address vulnerabilities that have been linked to a spyware campaign. iOS 16.6 fixes 25 iPhone security flaws, several of which are being exploited by threat actors...more

The Volkov Law Group

Technical Elements of a Cybersecurity Compliance Program (IV of IV)

The Volkov Law Group on

The term cybersecurity is thrown about because it covers so many risks.  There is no common definition of cybersecurity and the technical elements included in the term.  From a technical standpoint, cybersecurity covers...more

NAVEX

Risk’s Digital Transformation – When IT & Third-Party Risk Reached Main Street

NAVEX on

It wasn’t long ago that the phrase digital transformation conjured the image of a large-enterprise corporate luminary delivering a keynote about the technological metamorphosis of their industry. Digitalization of legacy...more

Planet Depos, LLC

Protecting your Law Firm against Ransomware Attacks

Planet Depos, LLC on

Have you heard of ransomware? It is a term often in the news. Ransomware is a type of malware. For those who have heard of it but don’t know what exactly it is, malware is a type of software that is designed to disrupt,...more

Wyrick Robbins Yates & Ponton LLP

Worried about Ransomware? Ten Steps to Help Legal Counsel Understand and Mitigate the Risk

Executive teams in the U.S. live in fear of a successful ransomware attack, and who can blame them? Attacks are both prevalent and evolving. Many attackers have shifted from encrypting data and locking up systems to also (or...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Robinson+Cole Data Privacy + Security Insider

Few Organizations are Actually Preparing for a Ransomware Attack

Although executives of organizations report that ransomware is their number one security concern, and 87 percent of them expect an increase in cyber-attacks against their organizations over the next year, only one-third of...more

Jones Day

California Attorney General Issues Bulletin on Health Data Breach Reporting Requirements

Jones Day on

The California Attorney General ("AG") has issued guidance reminding health care providers of their duty to report health care data breaches and to comply with other state and federal data privacy laws....more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Morgan Lewis

China Publishes New Measure on Cybersecurity Review of Network Products and Services

Morgan Lewis on

The new measure, which will come into effect on June 1, 2020, will potentially affect operators of critical information infrastructures as well as their domestic and overseas suppliers. Affected companies should now take...more

Carlton Fields

Privacy and Security Tips for Educators

Carlton Fields on

As education and communication with students has transitioned online, the privacy and security of educators and the information that they are sharing online becomes ever more important. The following privacy and security tips...more

White & Case LLP

Proposal on the Application of the NIS Regulations post-Brexit

White & Case LLP on

Organisations offering certain digital services in the United Kingdom (UK) and European Union (EU) should consider the impact of Brexit and their obligations under applicable cybersecurity law....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2019 #3

Robinson & Cole LLP on

A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2019

Robinson & Cole LLP on

Louisiana Governor John Bel Edwards, for the first time in history, declared a statewide cybersecurity emergency last week, following cyber-attacks against several school systems in the state. ...more

Robinson+Cole Data Privacy + Security Insider

Pay Attention to Your Firewalls

After the Capital One data breach, which was reportedly caused by an improperly configured firewall, every company should be paying attention to its firewalls....more

Robinson+Cole Data Privacy + Security Insider

U.S. Cyber Command Issues Warning About Microsoft Outlook Vulnerability

Hackers are targeting U.S. government networks, according to U.S. Cyber Command, which says there is a vulnerability of CVE-2017-1174, which is a two year old flaw in Microsoft Outlook that is being used by attackers to...more

Kramer Levin Naftalis & Frankel LLP

OCIE Warns That Investment Advisers and Broker-Dealers Are Putting Investor Information at Risk

The SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a risk alert warning that investment advisers and broker-dealers “[do] not always use the available security features” on various network storage...more

Hogan Lovells

China marches into cybersecurity classified protection 2.0 - May 2019

Hogan Lovells on

The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more

Robinson+Cole Data Privacy + Security Insider

VPN Packages Store Cookies Insecurely

The Department of Homeland Security (DHS) issued a warning on April 15, 2019, entitled “VPN Applications Insecurely Store Session Cookies” (Vulnerability Note VU#192371) stating that “[M]ultiple Virtual Private Network (VPN)...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Robinson+Cole Data Privacy + Security Insider

Drones Used as Source to Infiltrate Corporate Networks

Drones are being used by nefarious actors to spy on networks, intercept data, disrupt communications and hack into servers more than ever. In fact, drones are becoming a more and more prevalent source for infiltrating...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide