Cybersecurity

Data Theft Warning for Defense, Aviation and Manufacturing Industries

Malware that cybersecurity researchers are calling TA2541 is the subject of a recently-issued warning to the aviation, aerospace, defense, transportation […]

Log4Shell Threat Eases, Still High-Risk

The Log4Shell logging component, embedded in hundreds of products from VMWare, Oracle, IBM, Cisco and many in-house enterprise applications, has […]

Cell phone ringing with urgent message.

We’ve Been Hacked! Is There A Lawyer In The House?

When a business suspects a cyber incident, the first call is typically not to a cybersecurity firm, PR firm, or […]

Cartoon "cloud" bearing down and blowing wind.

Cloud Data Is Virtually Ransomware-Proof, But Breaches Are A Problem

Because cloud services are so proficient at creating multiple backups, they keep data virtually immune from ransomware attack, but the […]

Preserving Privilege In Data Breach Investigations

Preserving Privilege in Data Breach Investigations

Forensic examination of data systems is critical when responding to a data breach. However, with lawsuits under the California Consumer […]

Stylized image of police officer checking documenets.

Crackdown “Light” On Defense Contractor Cybersecurity

A post from law firm Morrison & Foerster outlines top cybersecurity “considerations” for government contractors in 2022, a word possibly […]

Good Sign For Cyber-Insureds

Insurance policies routinely include an exclusion for loss or damage caused by “hostile or warlike action” by governments, their militaries […]

Electrical transmission towers at night.

Cyber Warning: Time To Get Serious About Energy Infrastructure

The Department of Homeland Security has officially declared there are 18 critical infrastructure sectors in the United States. According to […]

Close up of a Rolls Royce grill.

The Luxury Side Of the Hack, And Other Cybersecurity Stories That Made History In 2021

Online publication Motherboard selects nine of the year’s best stories on hacking, information security, privacy, and surveillance “that we wish […]

New Technique to Fool Ransomware Protection

Log4j Flaw Widespread, Cyber-Attackers Probing Systems

Microsoft has warned its Windows and Aztec customers that it has observed state-sponsored and cyber-criminal attackers probing systems for the […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top