Monday, March 1, 2021

Subscribers Only

Free

FCC Chairman Tom Wheeler to Resign

Federal Communications Commission chair Tom Wheeler has announced he will step down from the agency at the end of the Obama administration, ending months of speculation about his plans. Upon Wheeler’s departure, the Republican-led commission is likely to reconsider rules on net neutrality and the classification of broadband as a public utility. More at Politico
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

138 Cyber Recommendations Remain Unaddressed, DoD OIG Says

The Department of Defense Office of Inspector General has released a summary of cybersecurity audit reports issued by OIG and the Government Accountability Office between August 2015 and July 2016. The most frequently cited cybersecurity weaknesses cited in the reports concerned risk management, identity and access management, security and privacy training, contractor systems, and configuration […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

TalkTalk Hack: Teenager Behind Massive Data Breach Given 12-month Rehabilitation Order

A 17-year old who admitted participating in a cyber attack on UK telecommunications firm TalkTalk has been sentenced to a 12-month youth rehabilitation order and ordered to surrender his iPhone and hard drive. The defendant used legitimate software to expose a vulnerability in the company’s website and shared details online. The hack resulted in a […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Webinar Recording: FCC’s New Privacy Rules (Part 2)

In the second part of a webinar series, experts from Davis Wright Tremaine examine what actions are required to ensure compliance with the Federal Communications Commission’s new security and data breach rules for broadband providers. In this presentation, DWT addresses the core requirements of the Notice and Choice rules, provide perspectives on the differences within […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Yahoo Says 1 Billion More User Accounts Hacked

On Wednesday, Yahoo announced that a 2013 data breach compromised more than 1 billion accounts. The reported breach is separate from a 2014 incident disclose in August, which compromised 500 million accounts. The attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords, and unencrypted security questions that could be used […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Data Breach Harm Standard May Head to SCOTUS in ‘17

Experts say it’s only a matter of time before a lawsuit seeking damages due to harm resulting from a cybersecurity breach makes its way to the Supreme Court. Although many such cases are filed, few have won on the merits and the full facts of the breach are often left undisclosed. Experts believe the time […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Treasury Official: CPAs Should Audit Firms’ Cyber Programs

Treasury Department Deputy Secretary Sarah Bloom Raskin says she supports a proposal that would encourage certified public accountants to assess the cybersecurity programs of the firms they audit. According to Raskin, a standard reporting framework could allow various types to organizations to demonstrate the level of effectiveness of their cybersecurity risk management programs in a […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Companies Without Incident Response Plans May Not Be Able to Get Cyber Insurance

A new report from the National Association of Insurance Commissioners Cybersecurity Task Force suggests that insurance companies will want to examine customers’ incident response plans and how they align with the business’ risk management practices. Firms lacking a robust incident response plan could find themselves ineligible for cyber insurance policies that cover liability for security […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

The Role of Cyber Security In Mergers And Acquisitions

Companies planning merger or acquisition activity should consider the risks presented by privileged accounts, which are a highly-targeted source of access for hackers. Merging companies should ensure their processes for assigning user privileges are aligned, have an inventory of which employees have privileged access and what they can access, and create and communicate clearly understood […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

The Legal Profession’s Obligation to Monitor Evolving Technology

The American Bar Association and 14 states require attorneys to remain abreast of information technology developments, including the risks and benefits of using technology in their practices. This requirement applies to the full range of legal practice, including billing, legal research, and records management, as well as to individual tools, such as computers, smart phones, […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.