Latest Posts › Cybersecurity

Share:

Tech Investing Part 1: Zero Hour

The technology sector runs the gamut from artificial intelligence (AI), the Internet of Things (IoT) to SaaS companies or cybersecurity, and from the biggest household names to the smallest companies being operated out of...more

The Evolving World of AI

Artificial intelligence (AI) refers to the ability of a computer or a computer-enabled robotic system to process information and produce outcomes in a manner similar to the thought processes of humans in learning, decision...more

The IOT is Here and so is the Regulation

For years, we have waited with bated breath the arrival of the “Internet of Things” (IoT) to transform garages into smart factories, cars into autonomous vehicles and ordinary homes into smart homes completely controllable by...more

Three More Risks to Consider with SaaS Solutions

As previously discussed, software as a service (SaaS) solutions offer the allure of being able to outsource IT for data storage. Being able to rely on someone else to protect you sounds great, but is it really? Losing...more

12/19/2018  /  Cybersecurity , Data Protection , SaaS , Vendors

State and Federal Power Struggle Over Data Privacy and Security

U.S. Senate leaders may be close to reaching an agreement on a legislative proposal that would establish a national data breach notification and security standard (the Data Acquisition and Technology Accountability and...more

Cyberattacks—Are You Ready?

Recent cyber-attacks hurt individuals and investors on a regular basis. Recent attacks have cost hundreds of millions of dollars. Firms that have dismissed the dangers are increasingly at risk of regulatory action. New...more

SEC’s IT Security Under Attack as It Attacks Others

The inspector general (IG) of the U.S. Securities and Exchange Commission (SEC) reported last week that the SEC has not sufficiently implemented information technology security upgrades in order to protect highly sensitive...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

Fitbit IPO Cyber Risk Disclosures

Earlier this month, fitness-tracking company Fitbit, Inc. filed a Form S-1 Registration Statement for an IPO of up to $100 million that exhaustively disclosed potential cybersecurity risks with respect to the personal data...more

EU Council Confirms the Forthcoming Strong Enforcement of Fundamental Right to Data Protection

A recent leaked draft proposal reveals the position of the E.U. Council as regards to the fines system that will come into force under the proposed new General Data Protection Regulation in the E.U. member states. The huge...more

CareFirst Suffers Cyberattack, Data Breach of 1.1 Million Customers’ Information

BREAKING NEWS: Health insurer CareFirst BlueCross BlueShield disclosed today that hackers gained access to one of its databases, exposing personally identifiable information for approximately 1.1 million people....more

SEC Division of Investment Management Issues Cybersecurity Guidance for Investment Funds and Advisers

The U.S. Securities and Exchange Commission’s (“SEC”) Division of Investment Management (“Division”) recently released a Guidance Update (“Guidance”) highlighting the importance of cybersecurity for registered investment...more

How Difficult is it to Break Encryption?

Whether it’s in discussions of public policy or discussions of best practices, encryption is all the rage right now. ...more

5/8/2015  /  Cybersecurity , Encryption

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

FFIEC’s Seven Cybersecurity Priorities for 2015

While others were waiting for spring to arrive, community bank officers and directors were waiting for the Federal Financial Institutions Examination Council (FFIEC) to provide additional guidance on its cybersecurity...more

4/10/2015  /  Community Banks , Cybersecurity , FFIEC
17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide