Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
9/1/2021
/ Best Practices ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Hackers ,
Malware ,
Popular ,
Ransomware ,
Risk Mitigation
Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more
With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
6/29/2021
/ Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Ransomware
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
Florida recently joined a small but growing number of states considering sweeping reforms to their data privacy and protection laws. House bill 969, titled “Consumer Data Privacy,” in many ways mirrors the California Consumer...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
COVID-19 spurred an overnight surge in demand for work-from-home vendors. These include companies offering audio and videoconferencing services, cloud services, e-commerce platforms, and virtual desktop infrastructure, to...more
4/5/2020
/ California Consumer Privacy Act (CCPA) ,
Contract Peformance ,
Corporate Counsel ,
Cybersecurity ,
Data Management ,
Data Security ,
Force Majeure Clause ,
General Data Protection Regulation (GDPR) ,
Privacy Policy ,
Telecommuting ,
Vendor Contacts
For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce,...more
Join Elizabeth Reilly from Fidelity National Financial and Carlton Fields’ attorneys Jack Clabby, Joe Swanson, and Steve Blickensderfer as they answer real questions from real members of the American Land Title Association on...more
Florida lawmakers have proposed data privacy legislation that, if adopted, would impose significant new obligations on companies offering a website or online service to Florida residents, including allowing consumers to “opt...more
1/15/2020
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Gramm-Leach-Blilely Act ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Governance ,
Legislative Agendas ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Privacy Policy ,
Proposed Legislation ,
Proposed Regulation ,
Regulatory Agenda ,
Risk Management ,
Rulemaking Process ,
State and Local Government ,
Websites
In this program, Jack Clabby, Joe Swanson and Steve Blickensderfer give practical advice on the attorneys’ role in a data security incident response guide, which is a key document in preparing for California’s new data...more
11/7/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Notification Requirements ,
Risk Mitigation ,
State Data Breach Notification Statutes
California passed a sweeping new privacy law that will impact many businesses. The California Consumer Privacy Act of 2018 (CCPA) is the first U.S. law to grant consumers extensive rights as to their personal information and...more
10/22/2019
/ Banks ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Gaming ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
lender ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
State and Local Government ,
Transparency
California’s new privacy statute imposes a number of new requirements on businesses that touch the personal information of California consumers. Its reach includes banks and financial services companies....more
8/30/2019
/ Banks ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Customer Privacy ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws
If a company has questions about how to comply with California’s new data privacy law, it may, under a remarkable provision of that law, request an opinion from California’s attorney general (AG). This article analyzes that...more
7/12/2019
/ Advisory Opinions ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Rights ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
State and Local Government ,
State Attorneys General ,
Supervisory Guidance
If a company sells personal information of California consumers, then the California Legislature has claimed real estate on its homepage. This article summarizes this new requirement of a “Do Not Sell My Personal Information”...more
6/28/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data-Sharing ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
State and Local Government ,
Websites
Sophisticated due diligence in corporate mergers and acquisitions has long included an assessment of the cybersecurity posture and privacy protocols of the target company. But the new California Consumer Privacy Act (CCPA)...more
We help companies prepare for, respond to, and clean up data breaches and related events. We are lawyers, but in this role, we often look over the shoulders of cybersecurity technical experts, who are advising companies on...more
The recent dismissal of a Home Depot derivative action ends a string of high-profile derivative suits stemming from large-scale corporate data breaches. On November 30, the Northern District of Georgia dismissed a shareholder...more
12/7/2016
/ Breach of Duty ,
Business Judgment Rule ,
Corporate Governance ,
Cybersecurity ,
Data Breach ,
Derivative Suit ,
Dismissals ,
Home Depot ,
Internal Controls ,
Popular ,
Proxy Statements ,
Shareholders