News & Analysis as of

Risk Management Cybersecurity Cloud Computing

BakerHostetler

FedRAMP Rewritten: OMB Publishes Guidance with FedRAMP’s Updated Vision, Scope and Governance Structure

BakerHostetler on

To dramatically scale up the Modernizing the Federal Risk and Authorization Management Program (FedRAMP) marketplace, the Office of Management and Budget (OMB) has completely rewritten FedRAMP’s vision, scope and governance...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Trusaic

Is Data Security A Priority for Your Workplace Equity Provider?

Trusaic on

Cyberattacks continue to rise, increasing the need for robust data security. Global weekly attacks rose by 7% during the first quarter of 2023, versus the same quarter last year. Each organization is estimated to face on...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Proskauer on Privacy

“Log4Shell” Vulnerability Has Potential to Compromise Millions of Devices

Proskauer on Privacy on

Cybersecurity experts around the world are scrambling to sound the alarm about a newly discovered security vulnerability that could be used by attackers to easily infiltrate computer systems. The vulnerability is found in...more

Society of Corporate Compliance and Ethics...

Chris Ford on Compliance and Cloud Computing

While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more

The Volkov Law Group

Cyber Incidents Underscore Absence of Real Private Sector Cybersecurity Standards

The Volkov Law Group on

Sometimes it takes a public event to remind corporate risk managers about the importance of effective risk management.  While corporate risk management functions have become yet another “hot” topic or new-fangled response to...more

Robinson+Cole Data Privacy + Security Insider

U.S. Chamber of Commerce and FICO Release Security Guidelines on Telework During COVID-19

It is no secret that companies are experiencing an increase in security incidents following the transition from work in the office to work from home during the pandemic. There are a number of causes, including the difficulty...more

Robinson+Cole Data Privacy + Security Insider

Transitioning from On-Site Audits to Zoom/Teams Audits

Auditors have to continue doing their job of auditing, but with the pandemic, audits now are rarely on-site. Many auditing firms are using remote technology to conduct audits, and companies are either forwarding files...more

White & Case LLP

Working from home – A checklist of the IT risks and exposures

White & Case LLP on

As the COVID-19 disease continues to spread, many countries have implemented nationwide lockdowns and many businesses have mandated employees to work from home. Even with the relaxation of lockdowns in different parts of the...more

Proskauer - New Media & Technology

Work-Outs of Technology and Services Agreements Challenged by COVID-19

In early February 2020, before most of us were truly aware of the implications of COVID-19, a well-respected IT consulting group predicted a $4.3 trillion global spend on information technology in 2020. Drivers of the...more

The Volkov Law Group

Living in the Cloud: Practical Approaches to Cybersecurity Risks (Part III of III)

The Volkov Law Group on

Businesses are increasingly relying on the cloud to store confidential and sensitive information.  One-third of information technology budgets are used for cloud services.  Rapid growth in cloud storage is expected over the...more

Burns & Levinson LLP

Should You Go “All In” with the Cloud? (And How to Manage That Risk)

Burns & Levinson LLP on

While references to “the cloud” and “cloud computing” are significantly more familiar than they were five years ago, it remains clear that many organizations implement cloud resources ineffectively – or at least do not...more

BCLP

Cloud Computing

BCLP on

Most companies today use some form of cloud computing whether through software-as-a-service, platform-as-a-service, or infrastructure-as-a-service. Cloud computing’s cost-effective scalability can offer significant advantages...more

Orrick, Herrington & Sutcliffe LLP

A Cloud on the Horizon: Trade Secret Theft in the Cloud

As cloud services have transformed modern business, they have also changed the way companies protect and enforce their trade secrets. Companies and their employees increasingly store data on cloud - based platforms. While...more

Pillsbury Winthrop Shaw Pittman LLP

European Businesses Offering Payment Services Told How to Manage Operational and Security Risks

Payment service providers operating in the EU must take note of new risk management requirements from the European Banking Authority. The European Banking Authority’s operational and risk management guidelines apply to all...more

Robinson+Cole Data Privacy + Security Insider

Forrester Cyber Predictions for 2017: Harsh Reality

Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Orrick - Trade Secrets Group

Trade Secrets and Cloud Services: Is the Sky the Limit?

Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies...more

WilmerHale

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

WilmerHale on

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

Orrick, Herrington & Sutcliffe LLP

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide