Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

NIST Releases Second Draft of Revised Cybersecurity Framework

The ever-smartening supply chain presents increasing cybersecurity risks to companies, and the importance of internal assessments has never been greater.  Accordingly, the National Institute of Standards and Technology (NIST) has released the second draft of Version 1.1 of the “Framework for Improving Critical Infrastructure Cybersecurity” for public comment. NIST provides valuable...

Triton Malware Shuts Down Industrial Plant

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an unnamed industrial plant. The hackers introduced a malware program that FireEye is calling “Triton” into the security system, likely in preparation for a larger attack. Learn more.

Nearly a third of U.S. businesses experienced a data breach: Survey

A recent survey for The Hartford Steam Boiler Inspection and Insurance Company (HSB) found that 29 percent of U.S. businesses experienced a data breach in the previous year. Nearly half of those breaches were caused by a vendor or contractor working for a business, 21 percent were the result of employee negligence, and 20 percent were the result of lost or stolen mobile devices or...

The High Stakes, High Seas Cyber Peril

Those who work in shipping are accustomed to the perils of the high seas, whether from storms, pirates, floods or fires. But now, a new danger is lurking—the possibility of a cyberattack. Despite the growing prevalence and severity of cyberattacks across industries, the shipping industry as a whole has been slow to react, and many are less than optimally prepared. When it comes to...

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

In September 2015, then-Director of National Intelligence James Clapper warned that the next “push of the envelope” in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the very beginning of such insidious attacks in the form of GPS spoofing—a technique that sends...

« Older Entries