
In the blockbuster film Terminator II, a young John Connor (played by Edward Furlong) steals money from an ATM using his laptop. The film was released in 1991, however, the story was set in 1995....
For businesses and nonprofit organizations searching for cyber insurance, it is important to know if your coverage limits are adequate. Whether you are in the market for a new policy or renewing an...
LONDON—Do you know what to do if your hotel has been hacked? Unfortunately, no company is immune to the problem, as illustrated in recently publicized events involving major hotel chains. Hackers...
CHICAGO--(BUSINESS WIRE)--Cyber risk insurance is the fastest growing segment in property/casualty insurance with an estimated $3 billion in premiums in 2015 and anticipated to triple in four years....
Washington, D.C. – The market for cyber insurance, a product that did not even exist before the mid-1990s, is booming.
A new report from the Bipartisan Policy Center’s insurance task...
TORONTO, March 17, 2016 /CNW/ - This Fraud Awareness Month, Insurance Bureau of Canada (IBC) offers its Top 10 tips to protect against cyber fraud and online identity...
The first wireless radio equipment was used aboard Lightship 70 in 1899.[1] Over the next 115 years, the use of technology in the maritime domain has driven rapid change in the United States Coast...
Biological viruses try to adapt to their surroundings to survive. Some fail, but some thrive, even spreading to become an epic epidemic. Cyber-threats are no different. In 2015, ransomware caused...
Most data breaches are small and go undetected for a long time, according to a report from Advisen, an insurance analytics firm. When they are detected, most organizations lack the internal...
New report shines light on what cyber insurance can and can't do for enterprises that suffer data breaches.
A vast majority of breaches fall below cyber insurance policy deductibles,...
The surge in ransomware and spear phishing attacks in 2015 will continue this year with a focus on the legal industry’s sensitive data, according to a report by TruShield
The legal industry...
List: A look through Verizon's Data Breach Digest and the different cyber scenarios that could threaten your business.
Verizon has released an in depth Data Breach Digest, which goes through...
British boardrooms are sleepwalking into a perfect storm of cyber security risk. While business leaders are comfortable dealing with established forms of risks where they can leverage their...
Healthcare, financial services and higher education sectors are particularly vulnerable
NEW YORK, March 8, 2016 (GLOBE NEWSWIRE) -- Beazley, a leading provider of data breach...
Our society is undergoing a profound digital transformation. As critical exposures become data, commerce electronic, and assets interconnected systems, the key personal, business and...