Mondaq USA: Technology > Security
Shearman & Sterling LLP
The changes to the cybersecurity and data protection landscape have been significant. The growing number and sophistication of cyberattacks
Akin Gump Strauss Hauer & Feld LLP
Since July 1, 2019, Delaware, New Hampshire and Connecticut have enacted laws imposing new cybersecurity requirements on insurers. These laws follow similar statutes already operating
BakerHostetler
On January 1, 2020, California's new Internet of Things (IoT) Security Law goes into effect. The law is the first IoT-specific security law in the United States and, simply put, requires all IoT
McLane Middleton, Professional Association
Phishing is the most prevalent cyber-attack. Why? Simply put, it works really well. While it is important that individuals learn how to avoid taking the bait...
Jones Day
Cybersecurity and privacy risks are on the rise, the regulatory landscape changes daily, and data protection authorities are closely examining data collection, use, and protection practices across
Foley & Lardner
Darkreading.com reported that the 281 criminals "stole more than 250,000 identities and filed more than 10,000 fraudulent tax returns… attempting to generate more than $91 million in refunds."
Arnold & Porter
The Department of Defense (DoD) has taken another step towards definitizing the cybersecurity requirements applicable to all of its contractors beginning in 2020, in the form of Cybersecurity
Cadwalader, Wickersham & Taft LLP
The North American Securities Administrators Association ("NASAA") reported examination findings at state-registered investment advisers, highlighting the rising rate of cybersecurity deficiencies.
Jones Day
The SHIELD Act significantly amends New York's data breach notification law and data protection requirements.
Jones Day
The New York State Department of Financial Services creates a new FinTech Division.
Jones Day
Whistleblower programs that previously focused on traditional concerns such as accounting and FCPA issues should now consider expanding
Foley & Lardner
In the last half of 2017, the U.S. House of Representatives passed the "Safely Ensuring Lives Future Deployment and Research In Vehicle Evolution Act" ("SELF DRIVE Act"), H.R. 3388
Lewis Brisbois Bisgaard & Smith LLP
Ransomware continues to cause severe disruptions and the loss of critical data within business information systems. It is also leveraging the use of certain
Moritt, Hock & Hamroff LLP
The Internal Revenue Service recently reminded tax professionals to be on the lookout for phishing emails designed to steal sensitive data, such as user names
Morrison & Foerster LLP
The Department of Defense (DoD) has taken another step on the path toward full implementation of its Cybersecurity Maturity Model Certification (CMMC) initiative.
Lewis Brisbois Bisgaard & Smith LLP
Malicious attackers continue to use email platforms for nefarious purposes.
Berman Fink Van Horn P.C.
An often-overlooked step in a company's cybersecurity strategy is the failure to manage third party risks.
Duane Morris LLP
Since the advent of the most rudimentary technology, criminal activity has followed. And in more recent times, the internet certainly has been no stranger
Sheppard Mullin Richter & Hampton
New York recently passed the SHIELD Act, which, among other things, newly establishes data security requirements for companies that collect private information
BakerHostetler
According to reports, late last week a large-scale dusting attack affected almost 300,000 litecoin wallets. By leveraging the divisibility of cryptocurrency
Latest Video
Most Popular Recent Articles
Lewis Brisbois Bisgaard & Smith LLP
The 2018 California legislative session was another busy year with numerous employment-related bill signed into law.
Jones Day
On the heels of the European Union's General Data Protection law, which went into effect in May 2018
Jones Day
Cybersecurity and privacy risks are on the rise, the regulatory landscape changes daily, and data protection authorities are closely examining data collection, use, and protection practices across
Holland & Knight
The Federal Energy Regulatory Commission (FERC) on June 20, 2019, approved a new mandatory cybersecurity reporting rule, CIP 008-6.
Dentons
How will we know when Smart Cities have arrived.
Smith Gambrell & Russell LLP
The scenario: In August 2018, the FTC announced an expanded settlement with Uber Technologies for its alleged failure to reasonably secure sensitive data in the cloud ...
Morrison & Foerster LLP
The Department of Defense (DoD) has taken another step on the path toward full implementation of its Cybersecurity Maturity Model Certification (CMMC) initiative.
Fenwick & West LLP
While many companies and service providers are spending significant time and budget on the privacy-related requirements of the forthcoming California Consumer
Akin Gump Strauss Hauer & Feld LLP
The Commerce Department's Bureau of Industry and Security (BIS) has added 46 additional Huawei affiliates to the Entity List.
Orrick
Amidst mounting pressure to pursue cybersecurity more aggressively, the FTC, the federal government's most active enforcer in the space, has recently imposed increasingly stringent cybersecurity requirements ...
Article Search Using Filters
Related Topics
Mondaq Advice Center (MACs)
Popular Authors
Popular Contributors
Up-coming Events Search
Tools
Font Size:
Translation
Channels
Mondaq on Twitter
Partners
In association with