News & Analysis as of

Training Today's Popular Updates Cyber Attacks

Husch Blackwell LLP

The Coast Guard’s Maritime Cybersecurity Rule Takes Effect

Husch Blackwell LLP on

Key point: The US Coast Guard’s new cybersecurity rule will transform the security standards and reporting requirements for vessels and marine facilities nationwide over the next three years. On July 16, 2025, the US Coast...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

What Practices Should a Small Vendor Consider When Applying for Cyber Insurance

Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an...more

Amundsen Davis LLC

Top 5 Cyber Security Threats the Manufacturing Industry Should Watch in 2022

Amundsen Davis LLC on

Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Jackson Lewis P.C.

Does Your Cyber Insurance Policy Look More Like Health Insurance?

Jackson Lewis P.C. on

Over the past several years, if your organization experienced a cyberattack, such as ransomware or a diversion of funds due to a business email compromise (BEC), and you had cyber insurance, you likely were very thankful....more

Bass, Berry & Sims PLC

Privacy Perils: Data Breach Strikes Cybersecurity Training Company

Bass, Berry & Sims PLC on

Most of us have never heard of SANS, a prominent and well-respected cybersecurity training company. As its website states, “SANS is the most trusted and by far the largest source for information security training in the...more

Hogan Lovells

Best practices for managing cybersecurity risks related to IoT-connected medical devices

Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Avoid the Headlines: Six Initial Steps To Take Today To Improve Your Company's Data Security

Unless you have been living under a rock, you are probably aware that companies are suffering cyber attacks that jeopardize sensitive company or customer data more and more frequently. What you may not know is that even more...more

Morgan Lewis

Proactive Approach To Cybersecurity: Recent SEC guidance and enforcement actions suggest that reactive firms may be in the SEC’s...

Morgan Lewis on

In an environment where even the largest and most powerful corporations have fallen victim to data breaches, it can be challenging to fathom how to protect against the sophisticated and ever-evolving threat of cyber attacks....more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide