News & Analysis as of

Today's Popular Updates Infrastructure Data Protection

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
Troutman Pepper

Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast

Troutman Pepper on

Ali Greenwood, executive director in Cushman & Wakefield's Global Data Center Advisory Group, joins host Alan Poole to discuss historical, current, and future drivers of the demand and velocity of data center construction...more

Nossaman LLP

White House Officials Want State Water/Wastewater Cybersecurity Plans Soon

Nossaman LLP on

In response to “multiple” cyber threat vectors, the Biden administration has asked governors of all 50 states to generate cybersecurity plans within 90 days (approximately July 1, 2024) to protect local water and wastewater...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Pillsbury Winthrop Shaw Pittman LLP

China Adopts New Data Security Law

The new Data Security Law, together with the Cybersecurity Law (effective since June 1, 2017) and the Personal Information Protection Law (which is expected to be formally published later this year) will serve as the three...more

Womble Bond Dickinson

The Commercial Gap in Digital Security

Womble Bond Dickinson on

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

Robinson+Cole Data Privacy + Security Insider

Responding to Cyber-Attacks in the Utility and Energy Sectors

To assist utilities with assessing and responding to cyber risks, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) recently issued a report on best practices to...more

Robins Kaplan LLP

Financial Daily Dose 9.10.2020 | Top Story: EU Regulators Challenge Facebook Data Transfers

Robins Kaplan LLP on

New concerns from Ireland’s Data Protection Commission about Facebook’s protection of information from American government surveillance may soon force the social networking giant to “overhaul its operations to keep data on...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of Retaliatory Cyber-Attack from Iran

The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more

Robinson+Cole Data Privacy + Security Insider

Iranian Cyber-Attacks and the End of Support for Windows 7 and Windows Server 2008

After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more

Robinson+Cole Data Privacy + Security Insider

Fort Worth Water Customers’ Credit Card Information Compromised

Approximately 3,000 customers of the Fort Worth Water Department were notified recently that their credit card information may have been compromised as a result of a data breach suffered by its vendor, Click2Gov....more

White and Williams LLP

Security of Critical Infrastructure Relies on Businesses to Build Resilience

White and Williams LLP on

The U.S. Department of Homeland Security (DHS) recently made “strengthening risk management and prioritization of cyber and physical threats and hazards” a national priority. Similarly, this week’s theme for National Cyber...more

Mintz - Privacy & Cybersecurity Viewpoints

National Cyber Strategy Aims to Deter through Strength; Collaborate with Private Sector to Secure Cyberspace

Late last week the White House released its National Cyber Strategy, setting forth its approach to protecting U.S. critical infrastructure from global cyber threats. The National Cyber Strategy builds off of Executive Order...more

Holland & Knight LLP

Global Cybersecurity Threats to the Maritime Sector

Holland & Knight LLP on

Cybersecurity risks to the nation's critical infrastructure (CI) – defined as 16 CI sectors, including transportation and maritime – continue to grow exponentially. The incoming Trump Administration has made it clear that...more

Williams Mullen

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

Williams Mullen on

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

Morrison & Foerster LLP - Social Media

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide