News & Analysis as of

Data Protection Internet of Things Cyber Attacks

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Clark Hill PLC

Right To Know - June 2024, Vol. 18

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Health Care Compliance Association (HCCA)

Privacy Briefs: February 2024

The American Hospital Association (AHA) has warned that information technology (IT) help desks are being targeted in a social engineering scheme that uses the stolen identity of revenue cycle employees or employees in other...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 1. Outlook 2023: Ransomware Threats Multiply as Rogue Nation-States Sponsor More...

Report on Patient Privacy Volume 23, no 1 (January 2023) Ransomware—including increased attacks from criminal groups affiliated with rogue nation-states such as Russia and North Korea—will continue to dominate the health...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 9. Privacy Briefs: September 2022

Report on Patient Privacy 22, no. 9 (September, 2022) - More than 92% of patients believe privacy is a right and their health data should not be available for purchase, according to a survey from the American Medical...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 3, Issue 5

The Cryptocurrency Revolution and President Biden's Formal Recognition - Out of the ashes of the 2008 financial crisis, Bitcoin sprang up like an insurgency, targeting both the unbridled activity of large financial...more

Proskauer Rose LLP

Trends in Privacy and Data Security: 2021

Proskauer Rose LLP on

An Article addressing key privacy and data security developments in 2021 and likely trends for 2022, including federal and state regulation and enforcement. This Article also discusses private litigation related to data...more

Health Care Compliance Association (HCCA)

2022 Outlook: More Dangerous Ransomware Coupled With Inadequate Security Practices

Report on Patient Privacy 22, no. 1 (January, 2022) - As the COVID-19 pandemic enters its third year, real “security fatigue” with pandemic-related issues will combine with cybercriminals’ increasingly sophisticated...more

Sheppard Mullin Richter & Hampton LLP

Double Time – NIST Seeks Comments on Major Revision to Practices for Developing Cyber-Resilient Systems (SP 800-160) and Assessing...

The National Institute of Standards and Technology (“NIST”) is seeking comments on its draft NIST SP 800-160, Volume 2, Revision 1, “Developing Cyber-Resilient Systems: A Systems Security Engineering Approach,” and draft NIST...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 2, Issue 8

Data Breach at New England’s Largest Energy Provider - "A misconfiguration error has exposed personal data belonging to customers of New England's largest energy provider." Why this is important: New England's largest...more

Epstein Becker & Green

“NAME:WRECK” Cybersecurity Vulnerability Highlights Importance of Newly Issued IoT Act

Epstein Becker & Green on

A recently discovered security vulnerability potentially affecting at least 100 million Internet of Things (“IoT”) devices[1] highlights the importance of the newly enacted IoT Cybersecurity Improvement Act of 2020 (the “IoT...more

Womble Bond Dickinson

It’s An Ill Wind All Right; Will It Blow Anybody Any Good?

Womble Bond Dickinson on

Announced within days of one another, two developments, one bureaucratic, one nefarious, showcased the growing chasm between the dream and the reality of our increasingly interconnected world. On December 4, 2020, President...more

Hogan Lovells

UK Government set to move forwards with regulation on consumer IoT device security

Hogan Lovells on

UK Government set to move forwards with regulation on consumer IoT device security The UK Government has just announced that it intends to draw up legislation aimed at ensuring that all consumer smart devices sold in the UK...more

K2 Integrity

Cybersecurity Awareness Month may be over – but threats are year round

K2 Integrity on

Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2019 #5

Robinson & Cole LLP on

Energy Sector’s Reliance on IoT Increases Cyber Vulnerabilities - CyberX recently released its 2020 Global IoT/ICS Risk Report (Report), which compiles survey questions and answers from 1,821 production networks of...more

Robinson+Cole Data Privacy + Security Insider

Phishing Continues to Be Seen as Biggest Cybersecurity Threat to Companies

According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night....more

Jones Day

Jones Day Global Privacy & Data Security Update | Vol. 20

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Releases Internal Report Regarding IoT Cybersecurity - In September, the National Institute of Standards and Technology ("NIST") released a draft...more

Hogan Lovells

California Passes First-Of-Its-Kind Law Focused on Internet of Things Cybersecurity

Hogan Lovells on

Late last month, California Governor Jerry Brown signed the first US Internet of Things (IoT) cybersecurity legislation: Senate Bill 327 and Assembly Bill 1906. ...more

White and Williams LLP

Five Steps to Make Your Home More Cyber Secure

White and Williams LLP on

October has been designated National Cyber Security Awareness Month by the Department of Homeland Security, and in the first week of the month we are focusing on developing good cybersecurity habits in our most personal...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2018 #4

Robinson & Cole LLP on

The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more

Robinson+Cole Data Privacy + Security Insider

FBI Releases Article on IoT Risks

The Federal Bureau of Investigation (FBI) released a Public Service Announcement on August 2, 2018 entitled “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities,”...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

43 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide