Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Toward a Culture of Continuous Cybersecurity

The SEC’s Office of Compliance Inspections and Examinations (OCIE) just issued a “Risk Alert” containing the results of its Cybersecurity 2 Initiative. In their article for Law360, which analyzes the OCIE Alert, Eversheds Sutherland (US) Partners Michael Bahar and Brian Rubin write that the SEC supports the notion that effective cybersecurity is not a matter of one-and-done, but rather...

The Future of Cyber Coverage Leans to Standardization

In this interview with A.M BestTV, Eversheds Sutherland (US) Partner Michael Bahar discusses cybersecurity issues and how organizations can prepare for potential cyberattacks. Learn more.

UK Data Regulator Reveals Sweeping International Strategy

The UK is committed to promoting itself as a global data protection gateway, with high standards of data protection law and practice, according to the UK Information Commissioner’s Office’s (ICO) newly released international strategy for effectively protecting the public’s personal information over the next four years. Learn...

The Regulatory Bellwether: Forecasting Cyber Breach Litigation

While the prospects of cybersecurity litigation loom ever larger, there are tangible ways that may very well decrease the unease and mitigate the risk—if you know where to look. Learn more.

Cyber Hostage-Taking: Petya Holds Physical Infrastructure for Ransom

On June 27, 2017, hackers struck vulnerable businesses around the world with a new version of the “Petya” ransomware. This major cyberattack has disrupted utilities, shipping companies, law firms and other businesses across the US, Russia, Europe and the Asia Pacific region. It continues to spread without regard to geographic or industry boundaries, and it has already impacted systems...

Election Hackers Altered Voter Rolls, Stole Private Data, Officials Say

Eversheds Sutherland (US) Partner Michael Bahar is quoted in this Time Magazine providing insight on the hacking of state and local election databases in 2016. Specifically, Michael addresses key questions congressional investigators are including in their probe to determine the nature and scale of the Russian cybersecurity attack. Learn...

« Older Entries