Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Malaysia seeks to expand personal data protection

Malaysia is looking to impose a data breach notification (DBN) requirement to its existing data privacy law, which would impact companies around the world who do business in Malaysia. The Malaysian Personal Data Protection Commissioner is currently hearing feedback on Public Consultation Paper No. 1/2018, which would impose a DBN requirement on companies that need to be registered with...

Financial institutions in Singapore to strengthen their cyber resilience— Monetary Authority of Singapore consults on cyber security measures

Recently, JPMorgan Chase CEO Jamie Dimon warned that the “biggest vulnerability” for the financial system is the threat of cyber attacks. Hackers, especially those working for nation-states, have grown more sophisticated and more determined, especially as geopolitical tensions rise. On September 6, 2018, the Monetary Authority of Singapore (MAS) issued a Consultation Paper on the...

Videocast: Cryptoassets and the regulatory environment—A look across the Atlantic

Regulators are grappling to define cryptoassets and are applying existing regulations or contemplating new rules to oversee markets for these new asset class(es). In this Bottom Line videocast, Eversheds Sutherland (US) Partner Greg Kaufman and Eversheds Sutherland (International) Partner Andrew Henderson discuss: important jurisdictional and definitional issues before US courts the UK...

Poland implements comprehensive cybersecurity legislation

Poland is the latest nation to pass extensive cybersecurity legislation that will impact many companies that do business in Poland. The legislation, called the Act on the National Cybersecurity System (ANCS), pertains to critical infrastructure companies and providers of digital services. Any organization that operates within Poland and is designated as one of these types of companies...

Videocast: Data manipulation–an overview

The next generation of cyber threats—data manipulation attacks—is already here. Increasingly, organizations need not only protect their data from theft and ransomware, but also from subtle changes designed to disrupt, embarrass, extort or even undermine the integrity of systems, companies and institutions. Organizations therefore should consider getting out ahead of this new form of...

« Older Entries Next Entries »