News & Analysis as of

Hackers Risk Management Best Practices

Morgan Lewis - Tech & Sourcing

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

Robinson+Cole Data Privacy + Security Insider

Responding to Cyber-Attacks in the Utility and Energy Sectors

To assist utilities with assessing and responding to cyber risks, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) recently issued a report on best practices to...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cybersecurity Challenges and Incident Response Preparedness During the Coronavirus Pandemic

The spread of the novel coronavirus has upended Americans’ lives in a matter of months. While life outside has ground to a standstill in many regions of the country, much of corporate America is meeting the unique challenges...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

White and Williams LLP

Five Steps to Make Your Home More Cyber Secure

White and Williams LLP on

October has been designated National Cyber Security Awareness Month by the Department of Homeland Security, and in the first week of the month we are focusing on developing good cybersecurity habits in our most personal...more

Burr & Forman

Best Practices to Detect and Prevent File-Less and Click-Less Malware

Burr & Forman on

Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity controls, hackers will typically look for an easier target or they will...more

Hogan Lovells

Best practices for managing cybersecurity risks related to IoT-connected medical devices

Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

Fenwick & West LLP

Top 10 Best Practices for Handling a Data Breach

Fenwick & West LLP on

Data breaches are a reality that all businesses need to take seriously. Knowing your vulnerabilities is only part of the solution. You and your key stakeholders should be prepared with an incident response plan that defines...more

Harris Beach Murtha PLLC

Information Security and Privacy Group News: Five Things You Can Do to Protect Your Business From a Cyber Attack

On Friday, May 12, 2017, a damaging ransomware attack swept across more than one hundred countries and infected tens of thousands of computers. As is becoming all too common, the hackers transmitted the ransomware via a...more

Robinson+Cole Data Privacy + Security Insider

Auto-ISAC announces automotive cybersecurity best practices

Members of the Automotive Information Sharing and Analysis Center (Auto-ISAC) recently released an overview of comprehensive Automotive Cybersecurity Best Practices developed as a proactive measure to further enhance vehicle...more

Gray Reed

Hack Attack?

Gray Reed on

Breathing a sigh of relief that he neither works for U.S. agencies requiring security clearances nor do his hiring policies require the details of mental illnesses, drug and alcohol use, past arrests, bankruptcies, Joe Hyre...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide