
Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage.
Stricter data privacy...
Ageneral warning has circulated for a few years now, alongside the the growth of the internet of things, that the more devices appear on the market, the more users are at risk for cyber...
Research firm Gartner’s annual Hype Cycle looks at emerging technologies, how they burst onto the scene (in terms of impact for both businesses and consumers) and their respective experiences with...
DAC Beachcroft says need for standalone cyber cover could be reinforced.
Law firm DAC Beachcroft predicts that changes in regulation will boost cyber insurance policies in 2016.
In...
Editor’s Note: The author of this post is the founder and CEO of Legal Mosaic, a strategic consulting firm and a regular contributor to Big Law Business.
Cybersecurity breaches have become as...
Understanding the changing Canadian cyber market and how to make it work to your advantage
Canadian Underwriter Magazine and IDT911 have partnered to offer a webinar on cyber risk.
The Canadian...
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according...
The Internet of Things: The Impact on the Travel and Hotel Industry
The Internet of Things (IoT) is a relatively large topic that is widely circulating...
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?
The Internet of...
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the...
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and...
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by...
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities...
What is a card data compromise?
A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include:
Theft of card data...
Two years later, and the Target data breach continues to make headlines.
Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...