
The Internet and related information and communications tools have delivered enormous benefits to the global economy. These gains, however, are expected to tail off as the technologies become...
A security firm’s annual security infrastructure report details the threats facing enterprise and organizations, with DDoS attacks continuing to be a significant disruptor.
It’s a report that...
Software with security flaws, and a lack of historical data on risks, have made the Internet of things tough to insure.
Insuring the security of connected products is hard for a simple reason:...
Mobile devices play a key role in the travel IoT
Whether it’s monitoring the performance of airline engines, enabling keyless entry to hotel rooms or helping tourists find their way around Disney...
Lloyd’s of London today announced that a set of common core data requirements for cyber risks has been agreed through ground breaking collaboration with modelling firms AIR Worldwide (AIR) and...
Cyber attacks continue to grow, with cyber thieves in pursuit of personally identifiable data that can be sold on the black market. According to the 2015 Symantec Internet Security Threat...
Throughout the past century we’ve witnessed how liability, regulation and legislation have been instrumental in improving security and safety. As Britain marks 50 years since the first seatbelt law...
Security breaches such as physical, network, system security and data breaches can happen to any company, regardless of industry or size. Recently, we’ve seen breaches at the U.S. Office of...
Due to the number of large data breach attacks in the past few years, more companies are recognizing how important it is to have cyber insurance coverage or to increase their coverage, and insurers...
Because of the nature of the information managed and stored, cyber-breaches and cybersecurity are sources of insecurity for every company. As we have already seen in the most...
A HIPAA risk assessment helps you identify potential issues and the steps you can take on behalf of your healthcare clients to reduce the risk of a data breach. But is it enough, does the...
Healthcare’s “wall-of-shame” for 2015 officially ends tonight at midnight. It’s not really a “wall,” it’s just a website, but it’s the online mechanism for the Office of Civil Rights (OCR)...
IN THE FUTURE, everything will be connected. It won’t just be our phones that access the Internet; it will be our light bulbs, our front doors, our microwaves, our comforters, our blenders. You...
Executive Summary
• Interest in cyber insurance and risk has grown beyond expectations in 2014 and 2015 as a result of high profile data breaches, including a massive data breach at health insurer...
New European legislation on data privacy is helping push up regional demand for cyber insurance, industry specialists say, after companies such as TalkTalk and Experian were affected by hackers...