
A HIPAA risk assessment helps you identify potential issues and the steps you can take on behalf of your healthcare clients to reduce the risk of a data breach. But is it enough, does the...
Healthcare’s “wall-of-shame” for 2015 officially ends tonight at midnight. It’s not really a “wall,” it’s just a website, but it’s the online mechanism for the Office of Civil Rights (OCR)...
IN THE FUTURE, everything will be connected. It won’t just be our phones that access the Internet; it will be our light bulbs, our front doors, our microwaves, our comforters, our blenders. You...
Executive Summary
• Interest in cyber insurance and risk has grown beyond expectations in 2014 and 2015 as a result of high profile data breaches, including a massive data breach at health insurer...
New European legislation on data privacy is helping push up regional demand for cyber insurance, industry specialists say, after companies such as TalkTalk and Experian were affected by hackers...
After nearly 4 years of negotiations, yesterday evening the EU reached agreement on the final provisions of its new data protection laws. With it, a new era of data protection has been ushered in...
It is an otherwise normal day until you, the general counsel, receive a call from the CIO: “We have a cyber-security breach. We’ve identified some unusual activity and it appears that data has...
No issue today has created more concern within corporate C-suites and boardrooms than cybersecurity risk. With the ability to shatter a company’s reputation with their customers and draw criticism...
In a world of increased business automation, often the greatest cyber risk companies face is not data security. Rather, businesses that rely upon computers and software to manage their refineries and...
The EU's first cyber-security law has been decided upon by both the European Parliament and the governments of the EU.
The law will require companies like to report their cyber-security...
Data breaches and cyber security have struck new fear into the hearts of every insurance company because of the nature of the information they handle. As we have seen in the recent data...
Cyber-insurance policies have been around for almost two decades, evolving from the very first third-party policy written by AIG’s Steve Haase in 1997, to a more customized and robust...
Businesses and organizations should expect cyber criminals to attack through wearable devices, employees’ home systems, cloud services and automobiles within the next year, according cyber experts at...
Corporate boardrooms are waking up to the encroaching, systemic threat of cybersecurity risks. But while awareness is growing — more than 80% of boards now discuss cybersecurity at most, if not all,...
The European Union’s Court of Justice decision prompts a look at how the privacy and cyber risk landscape has progressed outside of the United States. Cyber incidents in Europe began to spike in...