PubKCyber
Cyber developments and insights for the government contracts community

Latest Developments

12/07/2016

Legal Implications of DDoS Attacks and the Internet of Things (IoT)

With the increasing occurrence of digital denial of service attacks, and the likelihood they will become more common, organizations should prepare to prevent, mitigate, and respond to such incidents. In connection to their legal obligations and potential fallout, companies should…
12/07/2016

What Does China’s New Cyberspace Sovereignty Mean, and is Your Company Ready?

China’s new Cyberspace Security Law states the country’s claims of sovereignty over cyberspace, including its right to establish policy, laws, and regulations to govern data, networks, and facilities located in the country, to protect them against attack, and to prevent…
12/07/2016

Coming to Terms with Meaningful Automotive Cybersecurity

In this commentary, Mark Krotoski, a litigation partner in the Privacy and Cybersecurity and Antitrust Practice Groups of the Morgan, Lewis & Bockius Silicon Valley office, and Ellie Chapman, an associate at Morgan, Lewis & Bockius in San Francisco, say…
12/07/2016

Industry sees coming regulatory ‘pause’ on cyber

Industry groups are lauding the Commission on Enhancing National Cybersecurity’s recommendation that government not over-regulate private sector cybersecurity, but many still express concern about opening firms to liability for sharing threat information with government. During a recent panel discussion on…
12/07/2016

OIG Identifies Ongoing Security Deficiencies in DOL Systems

During its annual audit of compliance with the Federal Information Security Modernization Act, the Department of Labor Office of Inspector General found the department had not fully or effectively implemented minimum FISMA security requirements. OIG identified 116 deficiencies across 8…
12/07/2016

Don’t Forget the State Attorneys General

The role of state attorneys general in data privacy and security is expanding, as state laws, technology, and threats continue to evolve. Many state attorneys general have some level of law enforcement responsibility and may act in concert with other…
12/07/2016

Regarding the Report of the Presidential Commission on Enhancing National Cybersecurity…

In this commentary, Herb Lin, senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Research Fellow at the Hoover Institution, provides his insight as a member of the White House’s Commission on…
12/06/2016

GSA adds data security solutions to Schedule 70

The General Services Administration has added Adobe’s security and electronic signature solutions to its IT Schedule 70 through a governmentwide software acquisition agreement.
12/06/2016

Data Privacy Laws and Blocking Statutes: Practical Strategies for Counsel

International data privacy laws and blocking statutes preventing foreign nationals from complying with U.S. discovery requests can have a significant effect on cross-border investigations, discovery requests, and litigation. In such cases, counsel should be aware of the specific data privacy…
12/06/2016

Home Depot Blocks Shareholder Derivative Suit Over 2014 Data Breach

A federal judge has dismissed litigation against Home Depot that arose from 2014 data breach, finding that the company’s executives and board of directors took steps to address vulnerabilities, even though their actions were inadequate to prevent the breach. The…
12/06/2016

CIPL Issues White Paper on the GDPR’s One-Stop-Shop

Hunton & Williams LLP’s Centre for Information Policy Leadership has release a new white paper, The One-Stop Shop and the Lead DPA as Co-operation Mechanisms in the GDPR, which offers guidance and recommendations for interpreting and implementing provisions in the…
12/06/2016

Mandatory Insider Threat Programs May Make It Harder for Small Firms to Compete

Experts say that recent mandates for contractors to have efficient insider threat detection and mitigation programs will make it harder for small businesses to compete with large firms for high-dollar cybersecurity and intelligence contracts. Under a recent change to the…
12/06/2016

Survey: One-Fifth of Government Agencies Don’t Encrypt Data

According to a new survey of federal IT decision makers conducted by HyTrust, nearly 20 percent of agencies using the public cloud do not encrypt data, even though they say security is their top concern. Of agencies using public cloud…
12/06/2016

New NIST Report Focuses on Eliminating Software Bugs

In a new interagency report, the National Institute of Standards and Technology offers strategies and advice for reducing software bugs. In NISTIR 8151: Dramatically Reducing Software Vulnerabilities, NIST presents specific technical approaches for eliminating vulnerabilities before they occur, identifying them…
12/05/2016

NSF Plans $76M in Cybersecurity Research Grants

The National Science Foundation will award $76 million in research grants to support academic cybersecurity programs on securing the Internet of Things. Awarded through NSF's Secure and Trustworthy Cyberspace program, the 241 grants will support projects researching hardware, software, human…
12/05/2016

FCC Holds Off on New Cyber Requirements for Internet of Things

The Federal Communications Commission has put a hold on proposed new regulations to ensure the security of the internet of things. According to a work plan submitted to Senator Mark Warner (D-VA), FCC’s risk reduction program calls for a notice…
12/05/2016

Commission on Enhancing National Cybersecurity Issues Recommendations

The White House’s Commission on Enhancing Cybersecurity has released its report and recommendations on securing and growing the digital economy. The commission’s 16 recommendations and 53 specific action items address protecting the nation’s digital infrastructure and networks; accelerating investments and…
12/05/2016

Final Rule Implements FCC’s Privacy Rules for ISPs

On Friday, the Federal Communications Commission published a final rule applying the privacy requirements of the Communications Act to broadband Internet access service (BIAS) and other telecommunications services. The final rule implements the statutory requirement that telecommunications carriers protect the…

Categories