Incapsula’s 2014 DDoS Impact Report demonstrates an alarming trend—intrusions are becoming more prevalent, sophisticated and costly – while only 43% of respondents use a purpose-builIncapsula’s 2014...
Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage.
Stricter data privacy...
Ageneral warning has circulated for a few years now, alongside the the growth of the internet of things, that the more devices appear on the market, the more users are at risk for cyber...
Research firm Gartner’s annual Hype Cycle looks at emerging technologies, how they burst onto the scene (in terms of impact for both businesses and consumers) and their respective experiences with...
DAC Beachcroft says need for standalone cyber cover could be reinforced.
Law firm DAC Beachcroft predicts that changes in regulation will boost cyber insurance policies in 2016.
In...
Editor’s Note: The author of this post is the founder and CEO of Legal Mosaic, a strategic consulting firm and a regular contributor to Big Law Business.
Cybersecurity breaches have become as...
Understanding the changing Canadian cyber market and how to make it work to your advantage
Canadian Underwriter Magazine and IDT911 have partnered to offer a webinar on cyber risk.
The Canadian...
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according...
The Internet of Things: The Impact on the Travel and Hotel Industry
The Internet of Things (IoT) is a relatively large topic that is widely circulating...
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?
The Internet of...
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the...
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and...
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by...
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities...
What is a card data compromise?
A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include:
Theft of card data...
Two years later, and the Target data breach continues to make headlines.
Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones.
Drones take flight: Key issues for insurance...
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...