News & Analysis as of

Supply Chain Security and Privacy Controls

Venable LLP

The Subcontractor Performed. The Prime Contractor Paid. But a Hacker Ended Up with the Money. Who Is Responsible?

Venable LLP on

When hackers gain access to a subcontractor’s information systems and divert the prime contractor’s payment to themselves instead of to the subcontractor, does the prime contractor still have to pay the subcontractor?...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Stinson - Government Contracting Matters

U.S. Government Issues Alert Regarding Critical Windows 10 Update – Are You Entitled To Compensation?

Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more

Benesch

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

BCLP

Are Radio Waves Coming From My Wallet? The Privacy and Security Issues Involved With RFID Technology

BCLP on

Radio Frequency Identification (“RFID”) technology uses electromagnetic fields to transfer data. RFID systems typically operate by attaching tags to objects, devices, or cards....more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide