News & Analysis as of

Threat Management

Mayer Brown

UK Weekly Sanctions Update - Week of March 31, 2025

Mayer Brown on

In this weekly update, we summarise the most notable updates in the UK sanctions world....more

Accelerynt, Inc.

Integrating CrowdStrike Alerts with Microsoft Sentinel: Streamlining Threat Visibility

Accelerynt, Inc. on

When Security Tools Don’t Talk to Each Other - Managing multiple security tools shouldn’t feel like juggling. But for many teams, that’s the reality—especially when their endpoint protection and SIEM don’t automatically...more

Alston & Bird

Emergence of Medusa Ransomware

Alston & Bird on

On March 12, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued a...more

Segal McCambridge

The Rise of Online Abuse in Collegiate Sports: Lessons from the NCAA Threat Matrix Pilot Study

Segal McCambridge on

Online abuse in sports has reached alarming levels, targeting athletes, coaches, and officials, especially during high-profile events. Recognizing the growing threat, the National Collegiate Athletics Association (NCAA)...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

California Law Allowing Employers to Get Workplace Violence TROs Covering Harassment Takes Effect January 1, 2025

California employers will soon be able to more easily obtain temporary restraining orders (TROs) to protect employees from harassment before conduct has escalated to acts of violence or credible threats of violence under a...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Mayer Brown

6 Strategies for Managing Enterprise Risk

Mayer Brown on

Today’s ever-changing global threat environment—shaped by factors including geopolitical upheaval, sanctions, cyberthreats and ransomware attacks, pandemics and natural disasters, and artificial intelligence and emerging...more

Nossaman LLP

White House Officials Want State Water/Wastewater Cybersecurity Plans Soon

Nossaman LLP on

In response to “multiple” cyber threat vectors, the Biden administration has asked governors of all 50 states to generate cybersecurity plans within 90 days (approximately July 1, 2024) to protect local water and wastewater...more

Nossaman LLP

White House Issues Dire Warning Regarding Drinking Water Supply and Wastewater System Cyberattacks

Nossaman LLP on

The Biden-Harris Administration is redoubling its efforts to improve cybersecurity for the nation’s water systems. In March, the EPA and the White House issued a dire warning to state governors alerting them of the need to...more

Robinson+Cole Data Privacy + Security Insider

CISA Alerts Manufacturers to Eliminate Default Passwords

On December 15, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) issued a Secure by Design Alert and guidance on “How Manufacturers Can Protect Customers by Eliminating Default Passwords.”...more

Hinshaw & Culbertson - Employment Law...

The 12 Days of California Labor and Employment Series – Day 9 "Expansion of Bases for Restraining Orders in the Workplace"

In the spirit of the season, we are using our annual "12 days of the holidays" blog series to address new California laws and their impact on California employers. On the ninth day of the holidays, my labor and employment...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part 2)

TNG Consulting on

As we learned in part one of this strategic planning series, strategic planning is a critical tool to help behavioral intervention and threat assessment teams (BIT) meet the mission, vision, and internal/external mandates of...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part I)

TNG Consulting on

Imagine, if you will, that you have survived a horrific plane crash on top of a snowy mountain. Littered next to you are pieces of the plane, limited supplies, and one other survivor coming in and out of consciousness. Your...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #378 – Bad Actors Selling Data of 23andMe Users of Ashkenazi Jewish and Chinese Descent

We previously reported on the unfortunate data breach suffered by 23andMe last month and its implications. We never imagined how horrible it could be....more

The Volkov Law Group

Maintaining Focus on Cyber Risks (Part II of IV)

The Volkov Law Group on

If you read about the world of hackers and cyber threats, you will quickly become numb to the creativity and variety of techniques that may threaten your organization.  Like all risks, however, the key is to consider...more

Ballard Spahr LLP

The Supreme Court Does Not Pose a “True Threat” to Defamation Law

Ballard Spahr LLP on

Summary - An opinion about a category of unprotected speech called “true threats” sheds light on how a majority of the justices may view New York Times v. Sullivan, a key defamation case. It also resolves a split over the...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Three Advisories for Industrial Control Systems

On May 16, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) released three advisories applicable to Industrial Control Systems (ICS). The Alerts cover vulnerabilities of Snap One OvrC Cloud, Rockwell...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Group Uses Communication System of University

Threat actors never cease to find innovative ways to extort their victims. If only threat actors would use their creativity for good causes....more

StoneTurn

Trust and National Security: Lessons for Business Insider Threat Programs

StoneTurn on

The recent arrest and criminal charges against Airman First Class Jack Teixeira for the alleged posting of classified and sensitive information on social media is yet another example of the significant risk that trusted...more

Robinson+Cole Data Privacy + Security Insider

FIN7/Carbon Spider Attacks Veeam Backup Servers

Researchers at WithSecure cybersecurity firm have seen two malware attacks against Veeam Backup and Replication servers believed to be initiated by cybercrime group FIN7, also known as Carbon Spider, which has also been...more

Robinson+Cole Data Privacy + Security Insider

FBI, CISA + MS-ISAC Warn of LockBit 3.0 Ransomware

The FBI, CISA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) recently released a joint cybersecurity advisory, warning organizations about indicators of compromise, and tactics, techniques, and...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 7, December 2022

Welcome to our 7th and final edition of The Academic Advisor for 2022 - our e-newsletter focused on education law insights. In this issue, we discuss the academic strike occurring at the University of California and how...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 24, 2022

North Carolina Power Outage Points to Homeland Security Long-Documented Threats to US Power Grid - “Moore County blackouts serve as reminder that nation’s electricity infrastructure could be vulnerable targets for domestic...more

Polsinelli

Ten Individuals Charged in Business Email Compromise Scheme Targeting Medicare, Medicaid and Other Insurers

Polsinelli on

On November 18, 2022, the U.S. Department of Justice (“DOJ”) announced charges against ten defendants across Georgia, South Carolina and Virginia, resulting from a scheme that allegedly targeted Medicare, state Medicaid...more

99 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide