Cyber Insurance Cyber Masterclass Certificate

 

  

News

Phishing is a $3.7-million annual cost for average large company by Maria Korolov

27/08/2015 12:19
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according...

The Internet of Things: The Impact on the Travel and Hotel Industry

27/08/2015 10:19
The Internet of Things: The Impact on the Travel and Hotel Industry   The Internet of Things (IoT) is a relatively large topic that is widely circulating...

Why privacy concerns will hinder trust in the Internet of Things by Ben Ross

27/08/2015 10:14
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?   The Internet of...

Progressive Loses Appeal in Telematics Patent Suit to Liberty Mutual by Chris McMahon

26/08/2015 12:02
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the...

Why are manufacturers so prone to cyber attacks?

24/08/2015 15:24
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and...

Five myths of industrial control system security by David Emm

23/08/2015 19:29
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by...

Cyber threats could put lives at risk, Q2 2015 report explores

21/08/2015 21:48
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities...

Data Compromise-A Merchant Guide by TRI Staff

21/08/2015 15:04
What is a card data compromise?  A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include: Theft of card data...

What Insurance Should Cover Target’s Visa Settlement? by Scott N. Godes

21/08/2015 14:48
Two years later, and the Target data breach continues to make headlines. Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...

INTERNET OF THINGS AND INSURANCE

20/08/2015 15:34
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...

DRONES TAKE FLIGHT: KEY ISSUES FOR INSURANCE Lloyd’s new report

20/08/2015 14:21
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones. Drones take flight: Key issues for insurance...

Cyber-risk and insurance

19/08/2015 21:35
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...

Cyber insurance is only for retailers, right? Blog BT Policyholder Protection Blog

19/08/2015 21:29
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...

Cyber attacks: is your bank insured? Kilpatrick Townsend & Stockton LLP

19/08/2015 21:26
State and federal banking regulators’ recent focus on cyber security and cyber insurance underscores the importance of procuring cyber insurance, both as a risk management tool and for purposes of...

The limits of insurance in managing hotel cyberrisk

15/08/2015 17:47
It doesn’t require too great a leap to imagine a scenario where hackers infect computers in electricity generator control rooms with malware, causing a number of states across the United States to...
<< 33 | 34 | 35 | 36 | 37 >>