• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

Vulnerability

European Vulnerability Database Published by the European Union Agency for Cybersecurity

June 2, 2025 By Hanna Hewitt and Kelly Hagedorn

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here. ENISA created the EUVD under the Network and Information Securities 2 Directive (NIS2). It is a centralised database containing information on cybersecurity vulnerabilities affecting information technology […]

Filed Under: Data Security, EU, NIS 2, Uncategorized Tagged With: Cybersecurity, European Union (EU), Vulnerability

FTC Releases Warning to Companies that Fail to Mitigate Log4j Vulnerability

January 5, 2022 By Alysa Austin and Privacy, Cyber & Data Strategy Team

Less than a month ago, a critical vulnerability was identified in the ubiquitous, open source Log4j tool prompting swift guidance from Cybersecurity and Infrastructure Security Agency (CISA) and other security practitioners.  Now, the Federal Trade Commission (FTC) has warned companies that it “intends to use its full legal authority” against any company that fails to […]

Filed Under: Cyber Risk, Cybercrime, Cybersecurity, Enforcement, FTC Tagged With: Cybersecurity, Log4j, Vulnerability

CISA Issues Statement on Log4j Critical Vulnerability

December 13, 2021 By Kim Peretti

Log4j is a java-based tool from Apache’s open source library used for parsing logs that never seems to have made headlines before this past weekend.  Now, following the December 9th public announcement of a vulnerability in this tool, public and private sector security partners are issuing warnings about this “critical vulnerability.”  While the full scope […]

Filed Under: Cyber Risk, Cybercrime, Cybersecurity, Security Breach Tagged With: CISA, Cybersecurity, Log4j, Vulnerability

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up

@ALSTONPRIVACY
Click here to follow us on Twitter

Secondary Sidebar

Categories

Recent Posts

  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • UK Data Protection Regulator Fines 23andMe ~$3.1 Million Following Credential Stuffing Attack
  • NYDFS Issues Guidance on Heightened Cybersecurity and Sanctions Risk from Global Conflict
  • Are You Ready For The Department Of Justice’s Bulk Data Transfer Rule?
  • Trump Administration Releases Cyber Executive Order Revealing Renewed Strategy for U.S. Cybersecurity
Copyright © 2025 · Alston & Bird · All Rights Reserved. Privacy.
This website uses cookies to improve functionality and performance. By continuing to browse this site, you are consenting to the use of cookies on this website. OkCookie policy