Article archive

Why privacy concerns will hinder trust in the Internet of Things by Ben Ross

27/08/2015 10:14
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?   The Internet of Things (IoT) means that things that can sense our world have gained a voice and a utility. We now...

Progressive Loses Appeal in Telematics Patent Suit to Liberty Mutual by Chris McMahon

26/08/2015 12:02
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the validity of five Progressive patents related to online customer experience, insurance telematics and...

Why are manufacturers so prone to cyber attacks?

24/08/2015 15:24
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and crimeware.  Such attacks have the potential to bring down critical systems while bringing...

Five myths of industrial control system security by David Emm

23/08/2015 19:29
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by obscurity' is enough, says David Emm. David Emm, principal security researcher, global research...

Cyber threats could put lives at risk, Q2 2015 report explores

21/08/2015 21:48
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities and an increase in attacks by lone wolf operators. The report credited hackers with...

Data Compromise-A Merchant Guide by TRI Staff

21/08/2015 15:04
What is a card data compromise?  A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include: Theft of card data from merchant receipt copies or merchant transaction information (i.e. printed batch...

What Insurance Should Cover Target’s Visa Settlement? by Scott N. Godes

21/08/2015 14:48
Two years later, and the Target data breach continues to make headlines. Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated and settlements continue to be announced with payment card brands, it is difficult to forget the...

INTERNET OF THINGS AND INSURANCE

20/08/2015 15:34
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the connected home or health universe. This is one of the results of our study on the Internet of...

DRONES TAKE FLIGHT: KEY ISSUES FOR INSURANCE Lloyd’s new report

20/08/2015 14:21
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones. Drones take flight: Key issues for insurance (291.91 KB, pdf) The drones sector is expanding rapidly with global expenditure on the emerging...

Cyber-risk and insurance

19/08/2015 21:35
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem reported suffering a massive data breach estimated to have affected around 80 million customers and...
Items: 521 - 530 of 924
<< 51 | 52 | 53 | 54 | 55 >>