
While the main goal the Internet of Things is to make our lives more efficient and cost-effective, where is the real opportunity – and more importantly, what are the dangers?
The Internet of...
[Updated @ 12:23 pm with quotes from Progressive and industry experts] Liberty Mutual has prevailed over Progressive Insurance in the U.S. Court of Appeals for the Federal Circuit. At issue was the...
Verizon’s 2015 Data Breach Investigations Report (DBIR) has found that four out of five security incidents in the manufacturing sector involved denial of service (DoS) attacks, cyber-espionage and...
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and 'security by...
Trend Micro's Q2 2015 threat report hit on several issues in the security space, including those that pose an actual physical threat to the public, a string of powerful attacks on government entities...
What is a card data compromise?
A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include:
Theft of card data...
Two years later, and the Target data breach continues to make headlines.
Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones.
Drones take flight: Key issues for insurance...
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...
State and federal banking regulators’ recent focus on cyber security and cyber insurance underscores the importance of procuring cyber insurance, both as a risk management tool and for purposes of...
It doesn’t require too great a leap to imagine a scenario where hackers infect computers in electricity generator control rooms with malware, causing a number of states across the United States to...
UK companies continue to face significant risks from cyber related crime and effects. In a bid to increase clarity on the kinds of risk, their insurability and the perspective of the industry, Marsh...
Insurers across the UK and North America fear a cyber attack that could compromise the increasing volumes of personal data that they are keeping and processing in the cloud.
Indeed, security has...
An independent cyber security consultant has described how Saudi Aramco had to get by on typewriters and paper, after the August 2012 cyber-attack that disabled more than 30,000 of the company's...
The risk of security breaches is higher than ever thanks to the boom in the Internet of Things (IoT) market, according to an industry group, which has published a list of guidelines on how to keep...
The insurance industry is built on the skill of its underwriters in assessing and pricing risk, but there are some indicators that suggest an aging workforce combined with a continuing lack of...
A report, Insurance Banana Skins 2015, a global study conducted by CSFI (Centre for the Study of Financial Innovation) in conjunction with PwC polled over 800 insurance practitioners and...
Locke Lord’s Privacy and Cybersecurity Group White Paper, “Everyone’s Nightmare: Privacy and Data Breach Risks” discusses legal and regulatory privacy, data security and breach notification...