Cyber Insurance Cyber Masterclass Certificate

 

  

News

2015 Data Breaches :Identity Theft Resource Center Breach Report Hits Near Record High in 2015

06/02/2016 09:58
The number of U.S. data breaches tracked in 2015 totaled 781, according to a recent report released by theIdentity Theft Resource Center (ITRC) and sponsored by IDT911™. This represents the...

Cyber attacks are costing companies millions of dollars — here's how they can mitigate these costs by Jonathan Camhi

06/02/2016 08:04
    Companies are more worried than ever about the looming threat of hackers penetrating their networks. In the last year, the number of records exposed in data breaches rose 97%,...

EU GDPR: A Corporate Dilemma A Study on Corporate Readiness to Remove Customer Data

05/02/2016 05:21
On December 15, 2015, an agreement on the General Data Protection Regulation (GDPR) was reached following four years of negotiations between the European Commission, the European Parliament and the...

Kroll Bond Rating Agency Releases Research Note: Cyber Insurance - Behind the Numbers

03/02/2016 05:59
NEW YORK--(BUSINESS WIRE)--Kroll Bond Rating Agency (KBRA) released a research note outlining its views on the inconsistencies of public disclosures in describing the market for cyber insurance. The...

Tech Toys And Child Protection – The Internet Of Toys By Laurenti de' Medici

29/01/2016 07:44
Tech Toys And The Child Protection In The Age Of The IoT. The “Internet of things” (IoT) is no longer just a topic of conversation at your workplace or outside of it. It is no longer just a concept...

Zurich Report : Overcome by cyber risks?

27/01/2016 16:16
The Internet and related information and communications tools have delivered enormous benefits to the global economy. These gains, however, are expected to tail off as the technologies become...

Report: DDoS Attacks Are Becoming Extortion Attempts Rather than Activist Disruptions

27/01/2016 13:35
A security firm’s annual security infrastructure report details the threats facing enterprise and organizations, with DDoS attacks continuing to be a significant disruptor.   It’s a report that...

Can We Insure the Internet of Things Against Cyber Risk? by Tim Mullaney

26/01/2016 07:28
Software with security flaws, and a lack of historical data on risks, have made the Internet of things tough to insure.   Insuring the security of connected products is hard for a simple reason:...

How the Internet of Things Is Transforming Travel

22/01/2016 07:48
Mobile devices play a key role in the travel IoT Whether it’s monitoring the performance of airline engines, enabling keyless entry to hotel rooms or helping tourists find their way around Disney...

LLOYD'S LEADS DEVELOPMENT OF CORE DATA REQUIREMENTS FOR CYBER INSURANCE

20/01/2016 11:12
Lloyd’s of London today announced that a set of common core data requirements for cyber risks has been agreed through ground breaking collaboration with modelling firms AIR Worldwide (AIR) and...

Top 5 Cyber Risks for Businesses

18/01/2016 10:53
Cyber attacks continue to grow, with cyber thieves in pursuit of personally identifiable data that can be sold on the black market. According to the 2015 Symantec Internet Security Threat...

Liability can change attitudes to corporate cybersecurity by John Smith

16/01/2016 07:27
Throughout the past century we’ve witnessed how liability, regulation and legislation have been instrumental in improving security and safety. As Britain marks 50 years since the first seatbelt law...

Cyber Liability: Are You Feeling Lucky? by Sandra Lovett-Tillman

14/01/2016 04:59
Security breaches such as physical, network, system security and data breaches can happen to any company, regardless of industry or size.  Recently, we’ve seen breaches at the U.S. Office of...

Increasing Demand for Cyber Insurance

09/01/2016 07:40
Due to the number of large data breach attacks in the past few years, more companies are recognizing how important it is to have cyber insurance coverage or to increase their coverage, and insurers...

CEO & C-Level Executives Role in Data Breach Management by Nikos Georgopoulos

04/01/2016 10:30
    Because of the nature of the information managed and stored, cyber-breaches and cybersecurity are sources of insecurity for every company. As we have already seen in the most...
<< 27 | 28 | 29 | 30 | 31 >>