News & Analysis as of

Threat Management

Wiley Rein LLP

CISA 2015: Congress Faces Sept. 30 Deadline to Reauthorize Vital Cybersecurity Law

Wiley Rein LLP on

A vital cyber defense law known as the Cybersecurity Information Sharing Act of 2015 (CISA 2015) is poised to expire at the end of the month, and leaders in the House and Senate are working to negotiate a replacement within...more

Lowenstein Sandler LLP

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Robinson+Cole Data Privacy + Security Insider

CISA + Partners Release Advisory on Scattered Spider

On July 29, 2025, the Cybersecurity & Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation, Canadian Centre for Cyber Security, Royal Canadian Mounted Police, the Australian Cyber Security...more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

StoneTurn

Assessing the Iranian Cyber Arsenal: Post “12 Day War” Threat to Your Company

StoneTurn on

As tensions flare in the Middle East, speculation is growing over the potential impacts of Iranian cyberattacks targeting US based companies and infrastructure. We saw similar reactions in 2020 following the death of the head...more

Guidepost Solutions LLC

The New Reality of Risk: Protecting Executives and Individuals in Today’s Political Climate

The tragic murder of two Israeli Embassy staffers in DC on May 21 is a sobering reminder that tensions between pro-Israel and pro-Palestine groups remain high after October 7, 2023. In the aftermath of that war, several...more

FordHarrison

[Webinar] How Vulnerable Are You? Identifying, Mitigating & Responding to Safety Threats In & Outside of Work - May 21st, 3:30 pm...

FordHarrison on

In a world where threats to our personal and professional safety are constantly evolving, how prepared are you and your clients—really? Join us for our webinar program, “How Vulnerable Are You? Identifying, Mitigating &...more

Mayer Brown

UK Weekly Sanctions Update - Week of March 31, 2025

Mayer Brown on

In this weekly update, we summarise the most notable updates in the UK sanctions world....more

Alston & Bird

Emergence of Medusa Ransomware

Alston & Bird on

On March 12, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued a...more

Segal McCambridge

The Rise of Online Abuse in Collegiate Sports: Lessons from the NCAA Threat Matrix Pilot Study

Segal McCambridge on

Online abuse in sports has reached alarming levels, targeting athletes, coaches, and officials, especially during high-profile events. Recognizing the growing threat, the National Collegiate Athletics Association (NCAA)...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

California Law Allowing Employers to Get Workplace Violence TROs Covering Harassment Takes Effect January 1, 2025

California employers will soon be able to more easily obtain temporary restraining orders (TROs) to protect employees from harassment before conduct has escalated to acts of violence or credible threats of violence under a...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Mayer Brown

6 Strategies for Managing Enterprise Risk

Mayer Brown on

Today’s ever-changing global threat environment—shaped by factors including geopolitical upheaval, sanctions, cyberthreats and ransomware attacks, pandemics and natural disasters, and artificial intelligence and emerging...more

Nossaman LLP

White House Officials Want State Water/Wastewater Cybersecurity Plans Soon

Nossaman LLP on

In response to “multiple” cyber threat vectors, the Biden administration has asked governors of all 50 states to generate cybersecurity plans within 90 days (approximately July 1, 2024) to protect local water and wastewater...more

Nossaman LLP

White House Issues Dire Warning Regarding Drinking Water Supply and Wastewater System Cyberattacks

Nossaman LLP on

The Biden-Harris Administration is redoubling its efforts to improve cybersecurity for the nation’s water systems. In March, the EPA and the White House issued a dire warning to state governors alerting them of the need to...more

Robinson+Cole Data Privacy + Security Insider

CISA Alerts Manufacturers to Eliminate Default Passwords

On December 15, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) issued a Secure by Design Alert and guidance on “How Manufacturers Can Protect Customers by Eliminating Default Passwords.”...more

Hinshaw & Culbertson - Employment Law...

The 12 Days of California Labor and Employment Series – Day 9 "Expansion of Bases for Restraining Orders in the Workplace"

In the spirit of the season, we are using our annual "12 days of the holidays" blog series to address new California laws and their impact on California employers. On the ninth day of the holidays, my labor and employment...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part 2)

TNG Consulting on

As we learned in part one of this strategic planning series, strategic planning is a critical tool to help behavioral intervention and threat assessment teams (BIT) meet the mission, vision, and internal/external mandates of...more

TNG Consulting

Effective Strategic Planning For Your Behavioral Intervention and Threat Assessment Team (Part I)

TNG Consulting on

Imagine, if you will, that you have survived a horrific plane crash on top of a snowy mountain. Littered next to you are pieces of the plane, limited supplies, and one other survivor coming in and out of consciousness. Your...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #378 – Bad Actors Selling Data of 23andMe Users of Ashkenazi Jewish and Chinese Descent

We previously reported on the unfortunate data breach suffered by 23andMe last month and its implications. We never imagined how horrible it could be....more

The Volkov Law Group

Maintaining Focus on Cyber Risks (Part II of IV)

The Volkov Law Group on

If you read about the world of hackers and cyber threats, you will quickly become numb to the creativity and variety of techniques that may threaten your organization.  Like all risks, however, the key is to consider...more

Ballard Spahr LLP

The Supreme Court Does Not Pose a “True Threat” to Defamation Law

Ballard Spahr LLP on

Summary - An opinion about a category of unprotected speech called “true threats” sheds light on how a majority of the justices may view New York Times v. Sullivan, a key defamation case. It also resolves a split over the...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Three Advisories for Industrial Control Systems

On May 16, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) released three advisories applicable to Industrial Control Systems (ICS). The Alerts cover vulnerabilities of Snap One OvrC Cloud, Rockwell...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Group Uses Communication System of University

Threat actors never cease to find innovative ways to extort their victims. If only threat actors would use their creativity for good causes....more

104 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide