Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Cybersecurity and Data Privacy review and update: Looking back on 2018 and planning ahead for 2019

From the implementation of the GDPR to the passage of the CCPA, the year 2018 proved to be a monumental one for cybersecurity and data privacy. Regulators from around the world responded to devastating, large-scale cyber-attacks, and a desire for their citizens to have more control over their data, by passing a wide range of regulations aimed at protecting consumer information. These...

Insurers May Not be Able to Avoid Blockchain, Virtual Currencies ‘Sweeping Through Industry’

Virtual currency, such as bitcoin, is an unregulated digital form of currency that can be used as a substitute for legally recognized currency and eliminates the so-called “middle-man,” which includes banks and clearing houses. Learn more.

G-7 guidance on cybersecurity in the financial sector

The G-7 countries recently published important guidance on cybersecurity for the financial sector. While the aim of this guidance was harmonization, the practical reality remains one of piecemeal- and at times even conflicting – global, regulatory direction. To navigate this regulatory patchwork, international banks and financial institutions have to constantly assess the applicable...

NIST Releases Second Draft of Revised Cybersecurity Framework

The ever-smartening supply chain presents increasing cybersecurity risks to companies, and the importance of internal assessments has never been greater.  Accordingly, the National Institute of Standards and Technology (NIST) has released the second draft of Version 1.1 of the “Framework for Improving Critical Infrastructure Cybersecurity” for public comment. NIST provides valuable...

Triton Malware Shuts Down Industrial Plant

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an unnamed industrial plant. The hackers introduced a malware program that FireEye is calling “Triton” into the security system, likely in preparation for a larger attack. Learn more.

« Older Entries Next Entries »