Cyber Insurance Cyber Masterclass Certificate

 

  

News

10 Tips to Secure Passwords by Robert Siciliano

15/02/2015 07:23
Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to...

Privacy is Sexy

15/02/2015 07:10
In honor of Valentine’s Day, let’s celebrate the many ways in which privacy is sexy. Just like Justin Timberlake once encouraged us to "bring sexy back," how can we "bring privacy back" into our...

Case Study: Using Insurance to Protect Corporate Financial Objectives by Phil Ellis

15/02/2015 07:04
Optimizing insurance programs to act as a hedge to protect corporate financial objectives enables insurance buyers to deliver insurance programs that are superior in value and efficiency. Using...

Diversifying for a storm of cyber aggregation By Erin Ayers

13/02/2015 13:32
In the mid-2000s, U.S. property insurers underwent an intensive effort to analyze their books of business for over-concentration of risks, particularly along the nation’s coastline. Insurers worried...

Data Breaches and Security in Human Resources by: Ani Khachatoorian

13/02/2015 10:01
As a Human Resources professional, I have learned (sometimes painfully) of the need to be “security aware” regarding the data for which I am responsible. Today’s HR departments house vast...

Cyber is no longer just about data breaches

11/02/2015 14:38
Cyber risk is no longer just about data breaches and must be addressed as a global concern. That is the opinion of Graeme Newman, director, CFC Underwriting, speaking at the Cyber Risk Insurance...

Marketers, Please Tell Me You've Got a Better Plan for Privacy by Sam Pfeifle

08/02/2015 12:07
Consumers Don't Need to 'Stop Whining About Privacy.' They Need More Transparency. As someone interacting with privacy professionals on a daily basis, I was struck by this recent column in...

3 Ways Cyber Insurance Will Improve Security Performance by Ira Scharf

07/02/2015 16:23
Cyber insurance saw record growth in 2014. In fact, Advisen’s buyer penetration index showed a five-fold increase in cyber insurance purchases from 2006 to 2013, demonstrating that many organizations...

The cyber insurance cleanup crew: A look inside a data breach response team by David Weldon

07/02/2015 16:15
Later this month, Katherine Keefe expects to mark a very significant--and troubling--milestone. Her data breach response team at Beazley Insurance expects to investigate its 2,000th data...

European cyber market developing with different focus than U.S. by Erin Ayers

06/02/2015 14:10
The European cyber insurance market has developed at a slower pace and has not taken off in the way that the U.S. scene has due to a different cultural view toward data privacy and liability, but...

Is 2015 the Year for Cyber? by Andrea Wells

05/02/2015 07:18
For several years the insurance industry has talked about a pending surge in cyber insurance sales. And while cyber insurance appears to be trending up some say that “surge” has yet to come. That may...

Payment card industry is shifting liability to merchants

04/02/2015 10:38
Businesses large and small that accept credit cards in the United States are facing a harsh reality when it comes to fraud liability. In October 2015, most all major credit card companies will shift...

Most organisations are still unprepared for new EU data and security laws – report by Ben Rossi

02/02/2015 12:32
Survey shows that most businesses are not fully compliant and feel guidelines to achieve compliance are unclear. ‘One-third of organisations in France, Germany and UK do not fully understand the...

Better Safe Than Sorry: How Startups are Staying Protected in Cyberspace by Jason Ankeny

02/02/2015 07:40
Even business intelligence firms can learn a thing or two about doing business in the digital era. Just ask Bowman & Partners, a Roanoke, Texas-based startup that mines a wealth of brand and...

BMW cars found vulnerable in Connected Drive hack by Martyn Williams

31/01/2015 06:09
An attacker could mimic a BMW server and remotely unlock a car. A security vulnerability in BMW's Connected Drive system allowed researchers to imitate BMW servers and send remote unlocking...
<< 42 | 43 | 44 | 45 | 46 >>