News & Analysis as of

Vulnerability Assessments Risk Mitigation

Lowenstein Sandler LLP

Active and Critical Security Concern for SharePoint

Lowenstein Sandler LLP on

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

Ankura

Proactive Defense: A Step-by-Step Guide To Assessing Your Organization's Cyber Risk

Ankura on

In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more

Robinson+Cole Data Privacy + Security Insider

CISA, FBI + MS-ISAC Issue Warning on Phobos Ransomware

To help organizations protect against ransomware, CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a cybersecurity advisory  warning organizations about the Phobos ransomware, and...more

Mitratech Holdings, Inc

Understanding 4th- and Nth-Party Risk: What Do You Need to Know?

Strategies for Mitigating Unseen Threats and Managing 4th- and Nth-Party Risk in Your Modern Business. Organizations today have transitioned from using on-site server rooms to relying on third-party services and cloud...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Mitigation Guide for Healthcare + Public Health Sector

On November 17, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) released a supplemental mitigation guide for the healthcare and public health sector to the Cyber Risk Summary for those sectors published on...more

Robinson+Cole Data Privacy + Security Insider

Red Cross Creates Rules for Civilian Hackers in Conflict Zones

The International Committee of the Red Cross (ICRC) has taken a new step to regulate the activities of civilian hackers in conflict zones. To address the rise in the involvement of civilian hackers in inter-state conflicts,...more

Ankura

Is Your DNA Safe? DNA Sequencing Machines Found to Contain Critical Vulnerabilities

Ankura on

Key Points: Illumina DNA sequencing machines are vulnerable to exploitation. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have published advisories urging all...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues 2022 Top Routinely Exploited Vulnerabilities

In its continued effort to keep industry apprised of threats facing companies in the U.S., CISA recently issued a Cybersecurity Advisory: 2022 Top Routinely Exploited Vulnerabilities that is helpful to get up to speed on top...more

Robinson+Cole Data Privacy + Security Insider

Unpatched Fortinet Vulnerability Being Exploited by Threat Actors

According to cybersecurity researchers at Bishop Fox, “hundreds of thousands” of FortiGate firewalls have not been patched against a known vulnerability and are at risk of being attacked by threat actors using the unpatched...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Robinson+Cole Data Privacy + Security Insider

World Economic Forum’s Global Cybersecurity Outlook for 2023 Is Bleak

Sorry to be the bearer of bad news but remember that I am only the messenger. According to the World Economic Forum’s Global Cybersecurity Outlook 23 Insight Report (published in collaboration with Accenture), although...more

J.S. Held

Cyber Security & Business Interruption: Foundations for Prevention and Mitigation

J.S. Held on

The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more

Pillsbury Winthrop Shaw Pittman LLP

Congressional and Government Investigations in 2023: What to Expect from the New Congress

As the 118th Congress prepares to take office, those who may be targets of a new congressional agenda emphasizing government investigations should assess and address their vulnerabilities. Top industry targets for...more

Robinson+Cole Data Privacy + Security Insider

CISA Recommends Following Microsoft’s Mitigation for Zero Day Exploits

Microsoft recently issued mitigation steps for vulnerabilities that are being actively exploited by threat actors. Microsoft stated that it is aware that two vulnerabilities are being actively exploited to access users’...more

Guidepost Solutions LLC

Physical Security. Risk Mitigation. Where to Begin?

Why are you operating your physical security program? What threats are you trying to protect against? What specific risks to your organization and enterprise are you trying to mitigate? If you cannot quickly and...more

Robinson+Cole Health Law Diagnosis

Privacy Tip – Health Care Sector Continues to Be Hit with Ransomware

According to the 2022 State of Ransomware Report issued recently by Sophos, it surveyed 5,600 IT professionals from 31 countries, including professionals in the health care sector. Those professionals in the health care...more

Robinson+Cole Data Privacy + Security Insider

You Might Want to Rethink That New Meditation App

Researchers from the Mozilla Foundation reviewed the privacy policies of 32 mental health apps ranging from guided meditation to telehealth counseling services and flagged 28 of them as having “Privacy Not Included.” In...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #305 – Vishing, Smishing, and Now QRishing!

We have previously alerted you to vishing and smishing schemes. A new scheme, using QR codes, is called QRishing or quishing. According to security company Abnormal, between September 15 and October 13, 2021, it identified a...more

Robinson+Cole Data Privacy + Security Insider

CISA/FBI/NSA Issue Two Joint Cybersecurity Alerts for Critical Infrastructure

The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency recently issued two joint alerts to critical infrastructure entities—one addressing BlackMatter...more

McDermott Will & Emery

[Webinar] Compliance AI + Smart Lawyering: Maximizing Data to Stay Ahead of the DOJ’s Key Enforcement Areas - July 20th, 12:00 pm...

The US Department of Justice (DOJ) now has more ammunition and resources than ever to use data analytics in their investigations. The convergence of better technology, increasingly usable data sets, and the ripe combination...more

Alston & Bird

Top 7 Issues All General Counsel Need to Know About Ransomware

Alston & Bird on

Companies face increasingly tough decision points in preparing for and responding to the proliferation of ransomware attacks. Our Privacy, Cyber & Data Strategy Group outlines seven issues for general counsel to consider as...more

Herbert Smith Freehills Kramer

The Diligence Process for Privacy and Data Security: Telltale Indicators of a Data Program’s Strengths and Weaknesses

The rapid expansion of data security and privacy laws and regulations — both in the United States and internationally — harbors the potential for substantial liability, with the consequence that cyber compliance has become an...more

Health Care Compliance Association (HCCA)

[Webinar] How to Prescribe Opioids to Treat Pain and Avoid Legal Sanction - August 10th, 12:00 pm CT

Learning Objectives: - Learn what triggers a prescriber audit, define “best practice” and discuss state opioid prescribing requirements - Discuss how to effectively respond to a government inquiry/investigation:...more

Hogan Lovells

SIDN and its fight against cybercrime

Hogan Lovells on

Stichting Internet Domeinregistratie Nederland or SIDN, the Registry operator of the country code Top Level Domain (ccTLD) .NL (the Netherlands) appears to be increasing its efforts in its fight against cybercrime....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #2

Robinson & Cole LLP on

Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide