These are times when even the traditional havens of safety are not safe, as the Bangladesh central bank’s hack demonstrated recently. Breaches in not only high profile government institutions but even leading corporates like Sony, JP Morgan Chase, eBay and Target demonstrates that companies need to be better prepared to battle increasing sophisticated cyber-attacks. Ted […]

by

Albert Catalano joined Keller and Heckman in 2014.  Mr. Catalano has 30 years of experience in telecommunications regulatory and legislative matters, domestic and international joint ventures, litigation, and transactions involving communications, properties and investments.  Mr. Catalano represents States and other entities in matters related to the buildout of the 700 MHz nationwide public safety broadband […]

by

Your (Article, Chart, Blog) was successfully saved to your folder My Default Folder Don’t forget you can visit My Briefcase to manage your folders at any time. … read more at: http://www.americanlawyer.com/id=1202755928357/Jones-Day-KL-Gates-Bulk-Up-Cybersecurity-Practices

by

By Daniel R. Stoller April 22 — Companies involved in a merger or acquisition must be cognizant of cybersecurity risks or face possible grave financial and reputational harm, privacy attorneys told Bloomberg BNA. To avoid potential pitfalls, companies on both sides of the deal need to pay close attention to insider threats and cybersecurity risks […]

by

The hospital system tries to make thinking about safety a habit through staff testing. The IT security department regularly sends out phishing-style emails. If recipients are fooled and click on a link, it defaults to an online tutorial on how to spot malware. “We probably have a 97 percent pass rate,” said Arthur Ream, chief […]

by

What’s the first thing you think about when you hear the word “terrorism”? I’ll bet images of bombs and explosions went through your mind — maybe thoughts of 9/11 or Paris as well. That’s no surprise. That’s how we’ve illustrated the word for a long time. But we cannot rely on that illustration alone anymore. […]

by

by The New York Times SWJ Blog Post | April 24, 2016 – 8:08pm Login or register to post comments U.S. Cyberwar Aims to Cripple ISIS Operations and Recruiting by David E. Sanger, New York Times The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber […]

by

An IT professional, especially a cybersecurity professional at any level of an organization, knows the absolute importance of creating a system that is free from vulnerability and able to work without a cybersecurity threat looming over it. This means that you need to prepare your system against just about everything, and the only way to […]

by

MANILA, Philippines – Sen. Ralph Recto on Sunday called on the executive department to hire “bored” Filipino information technology experts as “cyber-commandos” who will improve and ensure cybersecurity of the government websites. Recto seeks to hire Filipino IT experts as white hackers or what Techopedia describe as computer security specialists who break into protected systems […]

by

Daytona State College is Florida’s first state college to have been deemed a National Center of Academic Excellence in Cyber Defense Education. The four-year designation, awarded based on academic criteria and strengths in cybersecurity and cyberforensics training, comes from the National Security Agency and the Department of Homeland Security. DSC’s cybersecurity concentration features an Advanced […]

by