• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

CISA

CISA and JCDC Conduct First-Ever Public-Private AI Security Incident Tabletop Exercise

August 6, 2024 By Daniel Felz and Kim Peretti

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) collaborated with the Joint Cyber Defense Collaborative (JCDC) to hold the federal government’s first tabletop exercise for “AI security incidents.  JCDC led the exercise and, true to JCDC’s public-private partnership model, included over 50 participants from various government agencies and private-sector companies. For those […]

Filed Under: AI, Artificial Intelligence, Cyber Risk, Cybercrime, Cybersecurity, Security Breach, Uncategorized Tagged With: AI, Artificial Intelligence, CISA, Cybersecurity

CISA Issues Statement on Log4j Critical Vulnerability

December 13, 2021 By Kim Peretti

Log4j is a java-based tool from Apache’s open source library used for parsing logs that never seems to have made headlines before this past weekend.  Now, following the December 9th public announcement of a vulnerability in this tool, public and private sector security partners are issuing warnings about this “critical vulnerability.”  While the full scope […]

Filed Under: Cyber Risk, Cybercrime, Cybersecurity, Security Breach Tagged With: CISA, Cybersecurity, Log4j, Vulnerability

U.S. Takes Part in Multinational Efforts to Disrupt Netwalker Ransomware and Emotet Malware

February 1, 2021 By Privacy, Cyber & Data Strategy Team

On January 27 and 28, 2021, the U.S. Department of Justice (DOJ) announced two successful operations to disrupt two different strains of malware, Netwalker ransomware and a banking Trojan known as Emotet, which have affected victims around the globe and caused millions of dollars in damage in recent years. The law enforcement actions against Netwalker and […]

Filed Under: Cybercrime, Digital Crimes, Enforcement Tagged With: CISA, Department of Justice (DOJ), Emotet, Netwalker

SolarWinds Hack: Unparalleled Supply Chain Attack Results in Potential Compromise of Private and Public Sector Organizations

December 17, 2020 By Kim Peretti and Privacy, Cyber & Data Strategy Team

On Sunday, December 13, 2020, SolarWinds announced that it had learned of a “highly sophisticated, manual supply chain attack” by a nation state affecting its Orion Platform, which is used by a wide variety of public and private sector organizations for IT infrastructure monitoring and management.  In this attack, adversaries were able to compromise the […]

Filed Under: Cybercrime, Cybersecurity, Data Breach, Data Security, Digital Crimes, National Security, Security Breach Tagged With: CISA, Cozy Bear, Department of Commerce (DOC), Federal Bureau of Investigation (FBI), FireEye, Microsoft, ODNI, Russia, SolarWinds, Supply Chain Attack, Treasury

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up

@ALSTONPRIVACY
Click here to follow us on Twitter

Secondary Sidebar

Categories

Recent Posts

  • UK Publishes Software Security Code
  • Texas AG Secures $1.375 Billion from Google: Key Takeaways for Companies Collecting Consumer Data
  • CISA Issues Enhanced Guidance to Mitigate Cyber Threats to Operational Technology Systems
  • CPPA Issues Revised Draft CCPA Regulations; Votes to Initiate Public Comment Period
  • UK Data Protection Regulator Fines UK Law Firm ~$80,000 Following Ransomware Incident
Copyright © 2025 · Alston & Bird · All Rights Reserved. Privacy.
This website uses cookies to improve functionality and performance. By continuing to browse this site, you are consenting to the use of cookies on this website. OkCookie policy