Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Are you ready for the next generation of cyberattack?

Of all the attention the recent Helsinki summit generated, one aspect has garnered virtually no coverage, but it has the ability to shake America and its companies to the core – the threat of data manipulation. Read this article to learn about the next generation of cyberattack, including: How hackers will manipulate, doctor and fake data to disrupt businesses and governments, if not...

NERC and power company reach settlement on violations of cybersecurity standards

A power company has reached an agreement with the North American Electric Reliability Corporation (NERC) to pay $2.7 million for violations of a cybersecurity reliability standard. This violation resulted from the online exposure of the company’s data due to a vendor’s mishandling of the data, allowing unrestricted third-party access to 30,000 asset records. The violation posed a...

The SEC wants companies to talk about cybersecurity

On February 21, 2018, the Securities and Exchange Commission issued an interpretive release providing important guidance to certain registrants on cybersecurity disclosure. The guidance makes clear its view that material risks or incidents related to cybersecurity fall within a company’s ongoing obligation to disclose material information in current and periodic reports. The guidance...

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

Securing the Cloud

Eversheds Sutherland Partner Michael Bahar is quoted in the Winter edition of USA Today Homeland Security regarding increasing efforts to keep data safe in the ‘new normal.’ “Particularly this summer, we’ve seen attackers going further – to extortion, data manipulation, disruption and even destruction,” said Michael. “What is increasingly critical is to respond to the rapidly evolving...

« Older Entries Next Entries »