Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
It is difficult, if not impossible to think of a comparable cyber event to the one that effectively shut down the fuel pipeline that feeds over a third of the United States. The incident is unprecedented, and it is almost unfathomable that it occurred — despite warnings and longstanding fears about this very type of critical infrastructure incident. As the reports roll in of yet another critical widespread security incident, we are in the midst of a national cyber crisis, in addition to a border crisis, an economic crisis, and a winding pandemic. While we may have blueprints for the resolution of these other crises, things must urgently change on the cybersecurity front.
Over the last several months, major cyberattacks have been all too common mercilessly sparing no one including hospitals and schools, and even more recently an attack on JBS, the world's largest beef supplier, who was forced to close its meat processing plants in the United States and Australia. Many organizations are also still reeling from the effects of the widespread Microsoft Exchange vulnerability exploit known as "Hafnium". Affecting an untold number of companies at the core of their communications, this exploit was designed to silently steal data and it has been traced back to Chinese hacking collectives. A little further back, we found out about the SolarWinds attack, which ultimately affected thousands of companies, blinding them from their environments, injecting code and leaking data, this time tracing back to Russian sources. (For more on the SolarWinds attack, see, "How Should Directors Respond to the SolarWinds Attack," in the May 2021 issue of Cybersecurity Law & Strategy.) There is also the continual feed of ransomware incidents and a few months ago, a cyber-attack attempted to poison a water-treatment plant in Florida.
|Unfortunately, Colonial Pipeline reportedly did the one thing that most security advisors and the FBI say should never be done — they paid close to $5 million in ransom to "Eastern European" hackers. (This price was apparently described as a 'bargain' based on comparisons to other ransomware attacks). This choice is only made when an organization has no strong cybersecurity plans, and no choice in the first place. Statistics show that less than 10 percent of companies that pay the ransom get all the data back they lost, and once a company pays, they will be known as a company that pays; meaning, hackers will come back for more.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.