News

Data Compromise-A Merchant Guide by TRI Staff

21/08/2015 15:04
What is a card data compromise?  A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include: Theft of card data...

What Insurance Should Cover Target’s Visa Settlement? by Scott N. Godes

21/08/2015 14:48
Two years later, and the Target data breach continues to make headlines. Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...

INTERNET OF THINGS AND INSURANCE

20/08/2015 15:34
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...

DRONES TAKE FLIGHT: KEY ISSUES FOR INSURANCE Lloyd’s new report

20/08/2015 14:21
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones. Drones take flight: Key issues for insurance...

Cyber-risk and insurance

19/08/2015 21:35
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...

Cyber insurance is only for retailers, right? Blog BT Policyholder Protection Blog

19/08/2015 21:29
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...

Cyber attacks: is your bank insured? Kilpatrick Townsend & Stockton LLP

19/08/2015 21:26
State and federal banking regulators’ recent focus on cyber security and cyber insurance underscores the importance of procuring cyber insurance, both as a risk management tool and for purposes of...

The limits of insurance in managing hotel cyberrisk

15/08/2015 17:47
It doesn’t require too great a leap to imagine a scenario where hackers infect computers in electricity generator control rooms with malware, causing a number of states across the United States to...

Marsh: Insurance in the fickle world of cyber security

13/08/2015 15:16
UK companies continue to face significant risks from cyber related crime and effects. In a bid to increase clarity on the kinds of risk, their insurability and the perspective of the industry, Marsh...

'Inevitable' that insurance companies will lose personal data to cyber attacks, claims report By Graeme Burton

13/08/2015 14:16
Insurers across the UK and North America fear a cyber attack that could compromise the increasing volumes of personal data that they are keeping and processing in the cloud. Indeed, security has...

‘No emails, no phones, nothing’: How Saudi Aramco - the world's biggest oil company - survived a debilitating cyber attack by Stephen McBride

13/08/2015 13:07
An independent cyber security consultant has described how Saudi Aramco had to get by on typewriters and paper, after the August 2012 cyber-attack that disabled more than 30,000 of the company's...

IoT boom needs to be matched by security - report by Hannah Breeze

13/08/2015 09:58
The risk of security breaches is higher than ever thanks to the boom in the Internet of Things (IoT) market, according to an industry group, which has published a list of guidelines on how to keep...

Halting the brain drain: Can insurance protect its intellectual legacy? by John Mountford

13/08/2015 09:41
The insurance industry is built on the skill of its underwriters in assessing and pricing risk, but there are some indicators that suggest an aging workforce combined with a continuing lack of...

PwC report list cyber risk, interest rate, tax burden as major challenges facing insurance

12/08/2015 09:48
A report, Insurance Banana Skins 2015, a global study conducted by CSFI (Centre for the Study of Financial Innovation) in conjunction with PwC polled over 800 insurance practitioners and...

Locke Lord Privacy White Paper, 2015 Edition – “Everyone’s Nightmare: Privacy and Data Breach Risks” by Locke Lord Publications

12/08/2015 09:43
Locke Lord’s Privacy and Cybersecurity Group White Paper, “Everyone’s Nightmare: Privacy and Data Breach Risks” discusses legal and regulatory privacy, data security and breach notification...

How Absolut Vodka will use the Internet of Things to sell more than 'static pieces of glass' by Shona Ghosh

07/08/2015 10:37
Most FMCG companies sell 'dead products', in that once they're off the shelf, there's little more a brand can do to talk to a consumer. The Internet of Things promises to change this, signalling...

INTERNET OF THINGS AND CYBERSECURITY by Kevin L. LaRoche & Scott Widdowson

07/08/2015 10:33
Introduction The "Internet of Things" (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the...

Fiat Chrysler Auto Recall Highlights Rising Fears About IoT Hacking

04/08/2015 21:34
NEWS ANALYSIS: The recall of 1.4 million Fiat Chrysler vehicles to update software to prevent a difficult-to-execute hack of onboard control systems highlights the rising fears about Internet of...

Cyber insurance market to hit US$10 billion by 2020, ABI Research suggests

03/08/2015 12:31
Risks will drive a US$10 billion cyber insurance market by 2020, suggests ABI Research, a London, United Kingdom-based technology market intelligence company with offices in North America, Europe and...

2015 Black Hat Attendee Survey

03/08/2015 06:25
2015: Time to Rethink Enterprise IT Security Executive Summary In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to...
<< 25 | 26 | 27 | 28 | 29 >>