News & Analysis as of

Law Enforcement Cyber Threats

Robinson+Cole Data Privacy + Security Insider

Law Enforcement Disrupts BlackSuit (Royal) Gang

In this line of work, I am often asked if law enforcement is ever successful in finding and punishing the threat actors who have wreaked havoc on U.S. businesses and stolen millions of dollars in ransomware attacks. I am so...more

K2 Integrity

Strengthening Security Protocols Amid Heightened Risk

K2 Integrity on

The recent tragic incident involving the UnitedHealthcare CEO has underscored the evolving and increasingly complex security landscape faced by today’s corporate leaders and organizations. In light of this event, we have seen...more

Warner Norcross + Judd

[Webinar] Wire Transfer Fraud: Preventing and Mitigating this Rising Threat - December 6th, 12:00 pm - 1:00 pm ET

Warner Norcross + Judd on

Join Warner Norcross + Judd LLP attorneys Madelaine Lane, Kelly Hollingsworth and Nate Steed for a webinar focused on preventing and mitigating wire transfer fraud. Cyber criminals are utilizing phishing emails and other...more

Womble Bond Dickinson

News Scan Finds Multiple Threats to Your Privacy

Womble Bond Dickinson on

Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more

Sheppard Mullin Richter & Hampton LLP

Privacy Developments in China, Singapore and Hong Kong

International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more

BCLP

Sharing Threat Indicators With The Government

BCLP on

After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more

Bryan Cave Leighton Paisner

Best Practices for Sharing Threat Indicators with the Government

After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide