Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

The SEC wants companies to talk about cybersecurity

On February 21, 2018, the Securities and Exchange Commission issued an interpretive release providing important guidance to certain registrants on cybersecurity disclosure. The guidance makes clear its view that material risks or incidents related to cybersecurity fall within a company’s ongoing obligation to disclose material information in current and periodic reports. The guidance...

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

G-7 guidance on cybersecurity in the financial sector

The G-7 countries recently published important guidance on cybersecurity for the financial sector. While the aim of this guidance was harmonization, the practical reality remains one of piecemeal- and at times even conflicting – global, regulatory direction. To navigate this regulatory patchwork, international banks and financial institutions have to constantly assess the applicable...

DoT to Unveil Revised Autonomous Vehicle Regulations

At the Detroit auto show, Secretary Chao announced that the Department of Transportation will release revised self-driving vehicle regulations this summer. The regulations are expected encompass trucks and transit vehicles in addition to automobiles. Learn more.

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

In September 2015, then-Director of National Intelligence James Clapper warned that the next “push of the envelope” in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the very beginning of such insidious attacks in the form of GPS spoofing—a technique that sends...

« Older Entries Next Entries »