Showing 2 posts from November 2017.

Potential Barriers and Limitations to Successful Cyber Subrogation

In a previous blog, we discussed “What is Cyber Subrogation?”  This week's blog will focus on potential barriers and limitations to successful cyber subrogation.  While this list is non-exhaustive, it gives an overview to the various barriers and limitations to successful cyber subrogation.  These barriers include (1) contractual waivers and limitations; (2) a lack of clear applicable standards; and (3) the first individuals to investigate the breach or attack are likely the later target defendants, i.e., the fox guarding the henhouse analogy. Read More ›

What is Cyber Subrogation?

Cyberattacks have become increasingly frequent and costly.  In 2015 alone, an estimated 300 million records were leaked and over $1 billion stolen.  By 2017, this number has only risen, with global companies becoming frequent targets.  This year, a specific malware cyber-attack orchestrated and launched on Tuesday, June 27, 2017 used a “NotPetya” attack.  The malware is called NotPetya because it masquerades as the Petya ransomware.  “This [malware] is definitely not designed to make money.  This is designed to spread fast and cause damage, with a plausibly deniable cover of ransomware”.[1] Read More ›

News: