News & Analysis as of

Sensitive Business Information Cybersecurity National Institute of Standards and Technology

Epstein Becker & Green

Preparing for the Cybersecurity and Fraud Risks of Deepfakes: What Executive Teams Need to Know

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

Epstein Becker & Green

Why Executive Teams Should Prepare for the Cybersecurity and Fraud Risks of Deepfakes

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Foley Hoag LLP

FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks

Foley Hoag LLP on

Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more

Wiley Rein LLP

Cleared Defense Contractors at Risk from Russian Cyber Activity; Advisory Shows Government Expectations

Wiley Rein LLP on

What: Cleared Defense Contractors (CDCs) are being actively targeted by Russian state-sponsored cyber activity, according to a Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI), National Security...more

Akin Gump Strauss Hauer & Feld LLP

Protecting Privacy in Virtual Meetings

As businesses and their employees come to terms with the new realities of working from home during the current COVID-19 pandemic, conference calls and virtual meetings are becoming more important than ever. The increase in...more

Sheppard Mullin Richter & Hampton LLP

“Internet of Things” Guidance to be Added to Cybersecurity Requirements for Agencies and Federal Contractors

In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more

Foley Hoag LLP - Security, Privacy and the...

CFTC Approves NFA Interpretive Notice on Information Systems Security Programs, Including Cybersecurity Guidance

The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide