News & Analysis as of

Authentication Best Practices

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

BCLP

FINRA Reminds Broker-Dealers of their Obligations to Safeguard Customer Information and to Build Controls Designed to Protect...

BCLP on

Key Takeaways: ..According to FINRA, the number of reported instances involving broker-dealer fraudulent account takeovers (ATO) and related theft is on the rise. ..As set forth in recently released FINRA Regulatory...more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

McManis Faulkner

Hackers are Vampires - Keep Them from Feeding on Your Private Information

McManis Faulkner on

According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more

Cooley LLP

Alert: UCLA Cleared in Lawsuit Alleging Lax Authentication Involving Insider Access to Medical Records

Cooley LLP on

Earlier this month, a California jury found the University of California, Los Angeles Health System (UCLA) not liable for damages that allegedly resulted when a medical office assistant, Alexis Price, improperly accessed and...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide