Latest Posts › Cybersecurity

Share:

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1 [Video]

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

Get Your House in Order: Four Steps to Take Now to Prepare for Ransomware

With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more

No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An SOC Technical Manager Who Builds Things With Keyboards and Blowtorches... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An OSINT Expert Who Credits Much of Her Success to Her Improv Comedy Skills... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Biden Administration Issues Practical Guidance for Ransomware Attacks

On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more

No Password Required: A Believer That the Key to Internet Safety Is Simple... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Florida's New Privacy Bill Promises Big Changes

Florida recently joined a small but growing number of states considering sweeping reforms to their data privacy and protection laws. House bill 969, titled “Consumer Data Privacy,” in many ways mirrors the California Consumer...more

No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An Inherently Trusting Person in an Inherently Distrusting Profession [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Journey From Math Camp to Cyber Intelligence [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Privacy and Cybersecurity Perils in Hastily Signed Work-From-Home Vendor Contracts

COVID-19 spurred an overnight surge in demand for work-from-home vendors. These include companies offering audio and videoconferencing services, cloud services, e-commerce platforms, and virtual desktop infrastructure, to...more

COVID-19 and Cybersecurity: Best Practices in an Uncertain Landscape

For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce,...more

The CCPA for the Land Title Industry: CCPA Resources and Compliance Tips [Video]

Join Elizabeth Reilly from Fidelity National Financial and Carlton Fields’ attorneys Jack Clabby, Joe Swanson, and Steve Blickensderfer as they answer real questions from real members of the American Land Title Association on...more

CF on Cyber: Leveraging the Incident Response Guide to Prepare for the CCPA [Video]

In this program, Jack Clabby, Joe Swanson and Steve Blickensderfer give practical advice on the attorneys’ role in a data security incident response guide, which is a key document in preparing for California’s new data...more

California Consumer Privacy Act: A Reference Guide for Compliance

California passed a sweeping new privacy law that will impact many businesses. The California Consumer Privacy Act of 2018 (CCPA) is the first U.S. law to grant consumers extensive rights as to their personal information and...more

Are Banks and Other Lenders Subject to the CCPA?

California’s new privacy statute imposes a number of new requirements on businesses that touch the personal information of California consumers. Its reach includes banks and financial services companies....more

Can You Write the California AG with Questions About CCPA Compliance?

If a company has questions about how to comply with California’s new data privacy law, it may, under a remarkable provision of that law, request an opinion from California’s attorney general (AG). This article analyzes that...more

The CCPA Has Placed a Mandatory Link on Your Company’s Homepage

If a company sells personal information of California consumers, then the California Legislature has claimed real estate on its homepage. This article summarizes this new requirement of a “Do Not Sell My Personal Information”...more

CF on Cyber: Cybersecurity Due Diligence in M&A Deals Under the CCPA and GDPR [Video]

Sophisticated due diligence in corporate mergers and acquisitions has long included an assessment of the cybersecurity posture and privacy protocols of the target company. But the new California Consumer Privacy Act (CCPA)...more

Cyber Update: Five Tips from the Front Lines of Practice to Limit Your Company’s Losses from a Breach

We help companies prepare for, respond to, and clean up data breaches and related events. We are lawyers, but in this role, we often look over the shoulders of cybersecurity technical experts, who are advising companies on...more

Home Depot Cyber Derivative Action Shuttered: Another Data-Breach Derivative Suit Fails to Clear Fundamental Corporate Law Hurdles

The recent dismissal of a Home Depot derivative action ends a string of high-profile derivative suits stemming from large-scale corporate data breaches. On November 30, the Northern District of Georgia dismissed a shareholder...more

82 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide