News & Analysis as of

Data Security Data Breach Risk Management

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

DarrowEverett LLP

Building Smarter: SaaS Agreements in Real Estate and Construction

DarrowEverett LLP on

The real estate development and construction industry has traditionally been driven by brick, mortar, and manpower. Yet, in today’s market, technology has become just as important a building block as concrete. From...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Lowenstein Sandler LLP

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Lowenstein Sandler LLP

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Lowenstein Sandler LLP on

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Alston & Bird

Rhode Island’s New Cybersecurity Law for Nonbank Financial Institutions

Alston & Bird on

Rhode Island has enacted Senate Bill 603 (SB603), effective July 2, 2025, establishing a comprehensive cybersecurity framework for nonbank financial institutions licensed by the state’s Department of Business Regulation...more

Baker Donelson

Ten Key Insights from IBM's Cost of a Data Breach Report 2025

Baker Donelson on

IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more

Downs Rachlin Martin PLLC

Data Breach Preparedness: Protecting Your Organization Before, During and After a Cyber Incident

There’s an “old saying” when it comes to data breaches:  it’s not whether your organization will face a potential data breach, but when. So, given the inevitability of a data breach, it only makes sense to prepare. As a data...more

Downs Rachlin Martin PLLC

Protecting Your Team's Data: What Every Employer Needs to Know

Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more

Smith Anderson

Brewing Trouble: The Steep Price of Privacy Missteps

Smith Anderson on

A recent high-profile breach at a women-focused dating app underscores how quickly a privacy misstep can escalate into lawsuits and reputational harm. The incident offers a cautionary tale for any company handling sensitive...more

Ankura

The Silent Epidemic: Infostealers and the Evolution of Cybercrime in 2025

Ankura on

"Infostealers" have transformed from niche threats into the backbone of modern cybercrime, fueling a $4.88 million average breach cost in 2024. In this article we synthesize the latest threat intelligence to expose critical...more

Ankura

The 'Butler Attack' — Delivering Prompt Data Breaches Direct From Your Mailbox

Ankura on

Forget the “Barbarians at the gate,” we may have bigger issues to deal with from the “Butler’s serving us at our Banquets.” While Business Email Compromise (BEC) and/or ransomware attacks have been effective cyber-crimes to...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Ary Rosenbaum - The Rosenbaum Law Firm P.C.

The New Priorities: Why Plan Sponsors Are Shifting Focus from Cost-Cutting to Cybersecurity and AI

For years, if you asked a 401(k) plan sponsor what their top concern was, you’d get a predictable answer: cost. Cutting expenses. Reducing fees. Pinching pennies. And it made sense. In a post-fee lawsuit world, with advisors...more

Integreon

Best Practices for Cyber Incident Prevention for Law Firms

Integreon on

In our global, digital-first economy, cyberattacks are no longer isolated incidents targeting large organizations. They are a very real threat to businesses of all types and sizes, and law firms are a common target of cyber...more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Wyrick Robbins Yates & Ponton LLP

Not Just for Auto Dealers: What the FTC’s Updated Safeguards Rule Means for All Non-Bank Financial Institutions

Last month, the Federal Trade Commission issued guidance on the updated Safeguards Rule in the form of a set of Frequently Asked Questions for Automobile Dealers. Although directed to auto dealers, the FAQs are a useful...more

Dinsmore & Shohl LLP

Recent OCR Settlements Emphasize the Need for Thorough HIPAA Risk Analysis

Dinsmore & Shohl LLP on

Two settlements recently announced by the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) reinforce the agency’s emphasis on promoting thorough risk analysis to help prevent disclosure of...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 210 | Jeff Fleming of HaystackID sits down with Kaylee & Mary

In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more

Jackson Lewis P.C.

We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions

Jackson Lewis P.C. on

To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition. ...more

Ary Rosenbaum - The Rosenbaum Law Firm P.C.

Cybersecurity is an important concern as a plan provider

Without fail, every single day—like clockwork—I get a handful of emails trying to pry their way into my digital life. Sometimes it’s an alleged Amazon receipt I never made, sometimes a fake Dropbox notice, and sometimes it’s...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Morgan Lewis - Tech & Sourcing

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

361 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide