SEC Urges Investment Firms to Better Prepare for Ransomware Attacks

By | Privacy Law Report | May 26, 2017
On May 17, 2017, the SEC’s Office of Compliance Inspection and Examination (“OCIE”) issued a risk alert urging broker-dealers, investment advisors and investment companies to safeguard themselves against ransomware in light of the recent global “WannaCry” ransomware attack that impacted entities in over one hundred countries, including Britain’s health system and major companies such as FedEx and Telefonia. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Steptoe Cyberlaw Podcast – Interview with Kevin Mandia

By | Steptoe Cyberblog | May 26, 2017
Episode 166 is the interview that goes with episode 165’s news roundup, released separately to ensure the timeliness of the news. In episode 166, we interview Kevin Mandia, the CEO and Board Director of FireEye, an intelligence-led security company.  FireEye recently outed a new cyberespionage actor associated with the Vietnamese government.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Deeper Dive: Security is a Big Deal for Big Data

Data-Incident-ReportIn the rapidly expanding landscape of Internet-based data analytic services, companies across all industries with a significant online presence have faced or will face a data breach resulting from their collection and use of Big Data. As more consumer information is digitized and collected by companies for data analytics, the potential for cyberattacks also increases. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

The Serious and Immense Impact of a Medical Device Hack

On August 25, 2016, investment firm Muddy Waters Research announced it had taken a short position in St. Jude Medical, Inc., and released a report suggesting a “strong possibility that close to half of” St. Jude revenues were about to disappear for a period of roughly two years because St. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

China’s Revised Draft Data Localisation Measures

shutterstock_293627249On 19 May 2017, the Cyberspace Administration of China (the CAC) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures (the Second Draft Export Review Measures). The draft emerged just over a week after public comments closed on the first draft of the measures, which we discussed in our earlier briefing here (the First Draft Export Review Measures).  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Preparing for and Minimizing a Ransomware Attack

By | Byte Back | May 25, 2017
Ransomware. It is the word every corporate board and IT team fears. Ransomware is a type of malicious software that can quickly shut down an entire network of computers and compromise an enormous amount of critical data. Often, when a ransomware attack occurs, all connected systems are locked down and a message appears on the victim’s screen stating that the victim’s system has been encrypted and that the victim’s data has been compromised.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus