News & Analysis as of

Network Security Today's Popular Updates Data Protection

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Bradley Arant Boult Cummings LLP

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

The Volkov Law Group

Technical Elements of a Cybersecurity Compliance Program (IV of IV)

The Volkov Law Group on

The term cybersecurity is thrown about because it covers so many risks.  There is no common definition of cybersecurity and the technical elements included in the term.  From a technical standpoint, cybersecurity covers...more

Robinson+Cole Data Privacy + Security Insider

Joint Advisory Warns of Chinese-sponsored Attacks on Telecommunications Companies

A joint advisory issued June 7, 2022, by the Cybersecurity & Infrastructure Security Agency, FBI and the National Security Agency entitled “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - April 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - DOJ Takes Down RaidForums' Website - In an action against what has been described as one of the largest hacker forums in the world, the U.S. Department of Justice (DOJ) announced on April 12, 2022, that...more

Robinson+Cole Data Privacy + Security Insider

FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure

U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more

Woods Rogers

Cybersecurity Awareness Month: Tips On Practicing Basic Cyber Hygiene

Woods Rogers on

In our first article to kick off Cybersecurity Awareness Month, we will discuss some steps businesses can take to improve their cyber hygiene.  Over the past few years, some of the largest and well-known companies have been...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Robinson+Cole Data Privacy + Security Insider

Few Organizations are Actually Preparing for a Ransomware Attack

Although executives of organizations report that ransomware is their number one security concern, and 87 percent of them expect an increase in cyber-attacks against their organizations over the next year, only one-third of...more

Jones Day

California Attorney General Issues Bulletin on Health Data Breach Reporting Requirements

Jones Day on

The California Attorney General ("AG") has issued guidance reminding health care providers of their duty to report health care data breaches and to comply with other state and federal data privacy laws....more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Bass, Berry & Sims PLC

Privacy Perils: Password Quarantine Hygiene

Bass, Berry & Sims PLC on

Some have used the pandemic, and now the extended inclement weather, to learn to play a musical instrument, speak a new language or another new skill. If those are beyond any of your reasonable expectations, do not simply...more

Morgan Lewis

China Publishes New Measure on Cybersecurity Review of Network Products and Services

Morgan Lewis on

The new measure, which will come into effect on June 1, 2020, will potentially affect operators of critical information infrastructures as well as their domestic and overseas suppliers. Affected companies should now take...more

Wilson Sonsini Goodrich & Rosati

The EU Cybersecurity Act Introduces Certifications and the New Cybersecurity Agency

On June 27, 2019, the EU Regulation on Information and Communication Technology (Cybersecurity Act or Act) became effective introducing, for the first time, EU-wide rules for the cybersecurity certification of products and...more

Hogan Lovells

China marches into cybersecurity classified protection 2.0 - May 2019

Hogan Lovells on

The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more

Bass, Berry & Sims PLC

Privacy Perils: I Spy Your Wi-Fi

Bass, Berry & Sims PLC on

Public Wi-Fi networks are a wonderful thing, particularly if you subscribe to a limited carrier data plan and have spent the month streaming Bachelor in Paradise or your favorite NCAA and NFL teams’ games. However, by...more

Robinson+Cole Data Privacy + Security Insider

FBI Warning: Russian Hackers Attacking Routers

Late last week, the Federal Bureau of Investigation (FBI) issued a warning to U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28 and believed to be backed by the Russian government) had...more

Hogan Lovells

10 steps to better cybersecurity -‘Intellectual Values seminar series #1’ video

Hogan Lovells on

Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more

K2 Integrity

Securing Your Home’s Digital Entry Points

K2 Integrity on

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

McDermott Will & Emery

China’s Network Security Law Comes into Effect: What It Means for Your Company

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

Morgan Lewis

China's Cybersecurity Law and Draft Implementation Rules

Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Manatt, Phelps & Phillips, LLP

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

Arnall Golden Gregory LLP

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide