News

What DDoS Attacks Really Cost Businesses - Incapsula’s 2014 DDoS Impact Report

06/09/2015 23:31
Incapsula’s 2014 DDoS Impact Report demonstrates an alarming trend—intrusions are becoming more prevalent, sophisticated and costly – while only 43% of respondents use a purpose-builIncapsula’s 2014...

Cyber Insurance: No longer a want, but a need By Steve Watts

06/09/2015 15:08
Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage. Stricter data privacy...

Security needed now for the internet of things by Juliana Kenny

05/09/2015 07:06
Ageneral warning has circulated for a few years now, alongside the the growth of the internet of things, that the more devices appear on the market, the more users are at risk for cyber...

Believing the hype: driverless cars and IoT by Juliana Kenny

05/09/2015 07:00
Research firm Gartner’s annual Hype Cycle looks at emerging technologies, how they burst onto the scene (in terms of impact for both businesses and consumers) and their respective experiences with...

Experts warn cyber risks could swamp the market by Ida Axling

04/09/2015 07:48
DAC Beachcroft says need for standalone cyber cover could be reinforced. Law firm DAC Beachcroft predicts that changes in regulation will boost cyber insurance policies in 2016.    In...

Law Firms, Data Breaches, and Insurance Coverage: A Curious Trifecta by Mark A. Cohen,

03/09/2015 10:55
Editor’s Note: The author of this post is the founder and CEO of Legal Mosaic, a strategic consulting firm and a regular contributor to Big Law Business. Cybersecurity breaches have become as...

Free Live Webinar: The Risks and Rewards of Cyber Coverage

02/09/2015 07:34
Understanding the changing Canadian cyber market and how to make it work to your advantage Canadian Underwriter Magazine and IDT911 have partnered to offer a webinar on cyber risk. The Canadian...

Phishing is a $3.7-million annual cost for average large company by Maria Korolov

27/08/2015 12:19
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according...

The Internet of Things: The Impact on the Travel and Hotel Industry

27/08/2015 10:19
The Internet of Things: The Impact on the Travel and Hotel Industry   The Internet of Things (IoT) is a relatively large topic that is widely circulating...

Why privacy concerns will hinder trust in the Internet of Things by Ben Ross

27/08/2015 10:14
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?   The Internet of...

Progressive Loses Appeal in Telematics Patent Suit to Liberty Mutual by Chris McMahon

26/08/2015 12:02
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the...

Why are manufacturers so prone to cyber attacks?

24/08/2015 15:24
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and...

Five myths of industrial control system security by David Emm

23/08/2015 19:29
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by...

Cyber threats could put lives at risk, Q2 2015 report explores

21/08/2015 21:48
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities...

Data Compromise-A Merchant Guide by TRI Staff

21/08/2015 15:04
What is a card data compromise?  A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include: Theft of card data...

What Insurance Should Cover Target’s Visa Settlement? by Scott N. Godes

21/08/2015 14:48
Two years later, and the Target data breach continues to make headlines. Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...

INTERNET OF THINGS AND INSURANCE

20/08/2015 15:34
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...

DRONES TAKE FLIGHT: KEY ISSUES FOR INSURANCE Lloyd’s new report

20/08/2015 14:21
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones. Drones take flight: Key issues for insurance...

Cyber-risk and insurance

19/08/2015 21:35
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...

Cyber insurance is only for retailers, right? Blog BT Policyholder Protection Blog

19/08/2015 21:29
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...
<< 24 | 25 | 26 | 27 | 28 >>