News

Auto insurers warily eye Google, Apple

29/12/2014 07:52
Tech giants loom as competitors in driver-monitoring devices Car-insurance industry, meet potential disrupters Google and Apple. Currently, nearly all mainstream insurers that offer driver-monitoring...

Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference by Pierluigi Paganini

28/12/2014 10:34
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP...

New market for hack-attack insurance takes root by Scott Tong

27/12/2014 20:27
For the second day, the digital Grinch has stolen Christmas for gamers around the globe. Networks went dark for Microsoft's Xbox and Sony Playstation users, with a group of hackers...

Big Year for Hackers, Capped By Sony, Delivers Strong Sales to Insurers by Leslie Scism

25/12/2014 10:37
After years of hype about how cyberinsurance was poised to become an important product for property-casualty companies, 2014 appears to be the year the coverage finally, firmly caught hold, according...

Sizing Up Cyber Risks after the Sony Breach by Travis Wall

25/12/2014 10:35
Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a...

Entry Point of JPMorgan Data Breach Is Identified by Matthew Goldstein, Nicole Perlroth and Michael Corkery

23/12/2014 06:52
The computer breach at JPMorgan Chase this summer — the largest intrusion of an American bank to date — might have been thwarted if the bank had installed a simple security fix to an overlooked...

Are Companies Too Focused on Cybercrime? by Judy Selby

23/12/2014 06:36
Companies are not paying enough attention on errant employees, and will pay the price in 2015.   As we come to the end of a tumultuous year where "data breach" became a household term, Experian...

Cyberattack on German steel factory causes 'massive damage by Loek Essers

21/12/2014 09:02
A German steel factory suffered massive damage after hackers managed to access production networks, allowing them to tamper with the controls of a blast furnace, the government said in its annual IT...

The Internet of Things to bring a new economic boom by Patrick Thibodeau

20/12/2014 07:54
The Internet of Things (IoT) may be more significant in reshaping the competitive landscape than the arrival of the Internet. Its productivity potential is so powerful it will deliver a new era of...

Should Your Company Get Cybersecurity Insurance? by Will Yakowicz

19/12/2014 18:18
The recent Sony breach was epic--more than 100 terabytes of data was compromised, including company employees' personal medical records, embarrassing email correspondence, and unreleased...

10 Worst Data Breaches of All Time By Elizabeth Palermo

17/12/2014 06:45
You probably heard about the Target data breach that put the credit-card numbers and personal information of millions of the retail giant's customers into the hands of cybercriminals in late 2013....

Websense 2015 Security Predictions Report

16/12/2014 20:18
Websense Security Labs has a proven track record of accurately predicting the threats that will face cybersecurity professionals over the next year. In 2014, seven of the eight forecasts were right...

A.M. Best Special Report: A.M. Best Fall 2014 Insurance Industry Survey Focuses on Cyber Risk

16/12/2014 19:29
OLDWICK, N.J.--(BUSINESS WIRE)--Cyber risk remains a fast-growing emerging risk for the insurance industry. Similar to other financial services sectors, the insurance industry is vulnerable to...

Hacking after Sony: What companies need to know by Amanda Schaupak

14/12/2014 18:14
The massive breach at Sony Pictures has raised fears that cyber crime is outpacing corporate security and that hackers have achieved a new height of technical ingenuity in their attacks....

Cyber Security Practices Insurance Underwriters Demand by Natalie Lehr

13/12/2014 04:44
Insurance underwriters aren't looking for companies impervious to risk. They want clients that understand the threat landscape and have demonstrated abilities to mitigate attacks. With security...

Managing cyber risks with insurance by PWC

11/12/2014 21:07
Key factors to consider when evaluating how cyber insurance can enhance your security program Managing cyber risks to sensitive information assets and systems is a top priority for most companies....

The other cyber shoe has dropped – What does that mean for your Insurance Program ? by Scott N. Godes

09/12/2014 20:38
Just when you thought that it could not get worse for companies in the context of cybersecurity and privacy issues…it does. The end of 2014 has been brutal. Perhaps most significant, a court allowed...

How stolen credit card data is used by Scott Aurnou

09/12/2014 05:22
  Hint: Emails recruiting you for "mystery shopper" and "work at home" opportunities are likely trying to involve you in the scams. Reports of high-profile data breaches have been hard to miss...

Car makers commit to privacy for connected cars by Giulio Coraggio

07/12/2014 01:06
19 makers of cars and trucks sold in the US committed to preserve the privacy of their customers in the view of the massive amount of personal data that are going to be processed through connected...

Lessons from Target Class Action Ruling by Judy Selby

07/12/2014 00:58
In addition to the consumer lawsuits arising out of last year's massive data breach, Target faces a potentially more problematic lawsuit brought by financial institutions that issued credit and debit...
<< 33 | 34 | 35 | 36 | 37 >>