Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Today’s cybersecurity strategies are “not sufficiently robust or scalable,” Nuclear Threat Initiative says

The cyber threat to nuclear facilities is serious, but the challenge going forward is evident,” Dr. Page Stoutland, NTI vice president of scientific and technicals affairs, said in the post. “Threats and vulnerabilities will continue to mount. Today’s strategy is not sufficiently robust or scalable, and a high level of cybersecurity may never be compatible with current nuclear plant...

G-7 guidance on cybersecurity in the financial sector

The G-7 countries recently published important guidance on cybersecurity for the financial sector. While the aim of this guidance was harmonization, the practical reality remains one of piecemeal- and at times even conflicting – global, regulatory direction. To navigate this regulatory patchwork, international banks and financial institutions have to constantly assess the applicable...

Cyber Attacks on U.S. Power Grids Can Be Deterred With Password Changes

A key to preventing cyber attacks from crippling U.S. power grids could be changing passwords on internet routers, wifi-connected thermostats and smart lawn-sprinklers. “A significant share” of internet attacks result from unchanged factory default passwords on web-connected devices that allow hackers to break in and and install malware, according to a Jan. 18 report by the Advanced...

The High Stakes, High Seas Cyber Peril

Those who work in shipping are accustomed to the perils of the high seas, whether from storms, pirates, floods or fires. But now, a new danger is lurking—the possibility of a cyberattack. Despite the growing prevalence and severity of cyberattacks across industries, the shipping industry as a whole has been slow to react, and many are less than optimally prepared. When it comes to...

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

In September 2015, then-Director of National Intelligence James Clapper warned that the next “push of the envelope” in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the very beginning of such insidious attacks in the form of GPS spoofing—a technique that sends...

« Older Entries Next Entries »