Crime Netherlands Technology Dutch servers used more in cyber attacks against foreign governments An increasing number of hacker groups and cyber spies make use of Dutch computer servers to attack foreign governments, according to a study done by internet security firm Trend Micro, BNR reports.  The Netherlands is an ideal place for cyber criminals due […]

by

Cybercriminals are way ahead of the game against defenders without having to try anything new, according to the latest edition of Verizon’s benchmark survey of security breaches. The study shows that miscreants have no need to switch up, because the same old tactics are still working fine. Security defenders are still performing poorly in their […]

by

The Pentagon is taking the fight on ISIS to the ground, from the air and, now, in cyberspace as well. Until recently, cyber warfare was the ultimate state secret. U.S. officials were hesitant even to admit that the military was thinking about developing offensive weapons. Now, we are learning that the Pentagon has not only […]

by

An addition to the House Defense Authorization Act would create a dedicated, mandatory training program for cybersecurity troops that play the “red team” – generally Iran, China, North Korea and Russia – in cyber war games, NextGov reported Monday. The new “cyber opposition forces” would be deployed by the end of 2017, concurrent on combatant […]

by

These are times when even the traditional havens of safety are not safe, as the Bangladesh central bank’s hack demonstrated recently. Breaches in not only high profile government institutions but even leading corporates like Sony, JP Morgan Chase, eBay and Target demonstrates that companies need to be better prepared to battle increasing sophisticated cyber-attacks. Ted […]

by

Albert Catalano joined Keller and Heckman in 2014.  Mr. Catalano has 30 years of experience in telecommunications regulatory and legislative matters, domestic and international joint ventures, litigation, and transactions involving communications, properties and investments.  Mr. Catalano represents States and other entities in matters related to the buildout of the 700 MHz nationwide public safety broadband […]

by

Your (Article, Chart, Blog) was successfully saved to your folder My Default Folder Don’t forget you can visit My Briefcase to manage your folders at any time. … read more at: http://www.americanlawyer.com/id=1202755928357/Jones-Day-KL-Gates-Bulk-Up-Cybersecurity-Practices

by

By Daniel R. Stoller April 22 — Companies involved in a merger or acquisition must be cognizant of cybersecurity risks or face possible grave financial and reputational harm, privacy attorneys told Bloomberg BNA. To avoid potential pitfalls, companies on both sides of the deal need to pay close attention to insider threats and cybersecurity risks […]

by

The hospital system tries to make thinking about safety a habit through staff testing. The IT security department regularly sends out phishing-style emails. If recipients are fooled and click on a link, it defaults to an online tutorial on how to spot malware. “We probably have a 97 percent pass rate,” said Arthur Ream, chief […]

by

What’s the first thing you think about when you hear the word “terrorism”? I’ll bet images of bombs and explosions went through your mind — maybe thoughts of 9/11 or Paris as well. That’s no surprise. That’s how we’ve illustrated the word for a long time. But we cannot rely on that illustration alone anymore. […]

by