Article archive

Boyden's Erik Matson to Speak at 2015 Cyber Risk Insights Conference in London

21/02/2015 15:18
By a News Reporter-Staff News Editor at Bioterrorism Week -- Erik Matson, a Partner with Boyden global executive search in New York, will address an audience of top insurance and risk management executives on the risks of cyber terrorism and the human capital that can be...

Lawyer who clicked on attachment loses $289K in hacker scam by Debra Cassens Weiss

20/02/2015 06:41
A lawyer who clicked on an email attachment lost $289,000 to hackers who likely installed a virus that recorded his keystrokes. The anonymous lawyer, identified only as John from the San Diego area, told ABC 10 News how it happened. On Feb. 9, John received an email with an address ending...

The opportunities and threats of the Internet of Things by Azita Esmaili

19/02/2015 10:03
You could almost guarantee that all products at CES this year were connected to the internet. At the beginning of the year I was one of the 170,000 delegates who attended the Consumer Electronics Show (CES) event in Las Vegas. With nearly 4,000 exhibitors, products varied from 3D...

With Self-Driving Vehicles on the Forefront, Companies Should Consider Cyber Insurance Coverage Options by Natalie A. Baughman

18/02/2015 13:05
As we move closer to a world of self-driving cars, it is important for companies involved in their manufacture to consider cyber insurance policies to provide coverage for the risks brought by this new technology. Google is currently testing a fully autonomous car in...

'Phishing' scams: 5 things to know by Elise Viebeck

18/02/2015 11:25
Cyberattacks are on the rise, and no method is proving more resilient and effective in the United States than "phishing" scams.  Phishing, sometimes called spoofing, is a way to trick someone into giving up valuable personal information by sending a fraudulent email.  In the email,...

10 Tips to Secure Passwords by Robert Siciliano

15/02/2015 07:23
Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach makes a hacker’s job all too easy. Here are 10 things you...

Privacy is Sexy

15/02/2015 07:10
In honor of Valentine’s Day, let’s celebrate the many ways in which privacy is sexy. Just like Justin Timberlake once encouraged us to "bring sexy back," how can we "bring privacy back" into our daily lives? Think privacy isn’t sexy? Which would you rather: Leave a little to the imagination, or put...

Case Study: Using Insurance to Protect Corporate Financial Objectives by Phil Ellis

15/02/2015 07:04
Optimizing insurance programs to act as a hedge to protect corporate financial objectives enables insurance buyers to deliver insurance programs that are superior in value and efficiency. Using insurance to reduce the volatility of an organization’s financial results moves insurance spend from...

Diversifying for a storm of cyber aggregation By Erin Ayers

13/02/2015 13:32
In the mid-2000s, U.S. property insurers underwent an intensive effort to analyze their books of business for over-concentration of risks, particularly along the nation’s coastline. Insurers worried that a major hurricane or storm would wipe out years of reserves and sought to become more...

Data Breaches and Security in Human Resources by: Ani Khachatoorian

13/02/2015 10:01
As a Human Resources professional, I have learned (sometimes painfully) of the need to be “security aware” regarding the data for which I am responsible. Today’s HR departments house vast amounts of data in various databases, some of which are managed on premises by our local IT departments,...
Items: 651 - 660 of 924
<< 64 | 65 | 66 | 67 | 68 >>