News & Analysis as of

Hackers Today's Popular Updates Risk Assessment

Carlton Fields

No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation

Carlton Fields on

Jon Schipp, the “Ric Flair of Cybersecurity,” is the senior director of inorganic growth strategy at Rapid7. Jon mixes cyber technical mastery, business acumen, and stage presence to identity mergers and partnerships for his...more

Foley & Lardner LLP

National Public Data Hack Exposes Millions: Essential Steps to Safeguard Your Identity and Combat Fraud

Foley & Lardner LLP on

The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more

BakerHostetler

Weekly Blockchain Blog - June 2024 #2

BakerHostetler on

TradFi/DeFi Integrations Announced, Yield-Bearing Stablecoin Launches - According to reports, Robinhood, a major U.S. financial services company, has entered into an agreement to acquire Bitstamp, a global cryptocurrency...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Health Care Compliance Association (HCCA)

Privacy Briefs: January 2024

New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Amundsen Davis LLC

Don’t Gamble With Your Cybersecurity and Incident Response Plan: Lessons Learned from the Las Vegas Ransomware Attacks

Amundsen Davis LLC on

Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more

BakerHostetler

CBDC Pilot Announced; Ethereum Upgrade Completed; U.S. Treasury Department Addresses DeFi Risks; Studies Analyze Crypto Taxation,...

BakerHostetler on

Montenegro Announces CBDC Pilot, BIS Compares CBDCs to Stablecoins - According to a recent press release, “The Central Bank of Montenegro (CBCG) has agreed to collaborate with the enterprise crypto and blockchain solutions...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

Ankura

Emerging Middle Market Cyber-Attack Vectors: Are You at Risk?

Ankura on

The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more

StoneTurn

Shifting Cyber Landscape – Crisis Awareness as a Means to Prevent and Prepare

StoneTurn on

Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more

Health Care Compliance Association (HCCA)

2022 Outlook: More Dangerous Ransomware Coupled With Inadequate Security Practices

Report on Patient Privacy 22, no. 1 (January, 2022) - As the COVID-19 pandemic enters its third year, real “security fatigue” with pandemic-related issues will combine with cybercriminals’ increasingly sophisticated...more

Nossaman LLP

How to Prevent an OFAC Sanction When Responding to a Ransomware Attack

Nossaman LLP on

A ransomware attack is a major threat affecting all sectors of business, including healthcare. Organizations typically follow state and federal privacy laws as part of their ransomware prevention and response measures....more

Proskauer on Privacy

SolarWinds Vendor Supply Chain Attack: A Timely Reason to Review Procedures for Risk Assessments and Vendor Contracts

Proskauer on Privacy on

As reported last week, a state-sponsored hacker may have breached multiple U.S. government networks through a widely-used software product offered by SolarWinds. The compromised product, known as Orion, helps organizations...more

NAVEX

3 Coronavirus Compliance Tips From the SEC

NAVEX on

The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more

Rosenberg Martin Greenberg LLP

Bitcoin, the IRS, and the Love that was Lost

We have all heard the stories. Romeo and Juliet, Cleopatra and Mark Antony, and my personal favorite, Illsa Lund and Rick Blaine. Everyone loves a great love story.  A developing romance leading to an emotionally pleasing and...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cybersecurity Considerations in Oil and Gas Transactions

One of the foremost threats companies face today is that posed by cybercriminals, and the unique vulnerabilities of companies in the oil and gas sector create heightened cybersecurity risks for those pursing transactions in...more

The Volkov Law Group

Managing Third-Party Vendor Cybersecurity Risks (Part II of III)

The Volkov Law Group on

We all know that businesses rely on a large number of third-party vendors to support their business operations.  Many of these third parties require access to a company’s data and its internal information and technology...more

Furia Rubel Communications, Inc.

Cybersecurity: How to Protect Yourself and Your Company

Just recently, Equifax had the largest-ever settlement for a data breach. They are to pay at least $575 million, and potentially as much as $700 million, to settle allegations over its massive 2017 data breach. What we tell...more

King & Spalding

Why Complete an Enterprise Risk Assessment

King & Spalding on

Your Organization’s best defense in an environment of aggressive regulators and litigious plaintiffs’ counsel is the completion of an enterprise risk assessment. Regulators and attorneys general are fining–sometimes hundreds...more

White and Williams LLP

Five Questions (And Possible Good Answers) Boards of Directors Should Ask About Cybersecurity

White and Williams LLP on

Data privacy and security can feel overwhelming for a company’s executive management. Unfortunately, that overwhelming feeling can prevent constructive dialogue and action toward improving a company’s cybersecurity program....more

Opportune LLP

Power Plants: Cybersecurity Threats and Risks (Part 1)

Opportune LLP on

This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more

Epiq

Spectre and Meltdown CPU Vulnerability: Impact on Multifunction Copiers & Printers

Epiq on

Two major security flaws recently discovered in nearly all the world’s microprocessors, termed Meltdown and Spectre, leave much of the world’s computers vulnerable to hackers looking to steal entire memory contents. They...more

Thomas Fox - Compliance Evangelist

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

Robins Kaplan LLP

New FTC Data Breach Response Guidelines

Robins Kaplan LLP on

Cybersecurity should always be at the top of any retailer’s priority list—and even more so as the holiday shopping season gets underway. To that end, the Federal Trade Commission’s newly-released Data Breach Response...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide