Article archive

How the Internet of Things Is Transforming Travel

22/01/2016 07:48
Mobile devices play a key role in the travel IoT Whether it’s monitoring the performance of airline engines, enabling keyless entry to hotel rooms or helping tourists find their way around Disney World, the internet of things (IoT) is creating exciting opportunities for the travel and hospitality...

LLOYD'S LEADS DEVELOPMENT OF CORE DATA REQUIREMENTS FOR CYBER INSURANCE

20/01/2016 11:12
Lloyd’s of London today announced that a set of common core data requirements for cyber risks has been agreed through ground breaking collaboration with modelling firms AIR Worldwide (AIR) and RMS with the Cambridge Centre of Risk Studies. Both AIR and the RMS/Cambridge team have agreed...

Top 5 Cyber Risks for Businesses

18/01/2016 10:53
Cyber attacks continue to grow, with cyber thieves in pursuit of personally identifiable data that can be sold on the black market. According to the 2015 Symantec Internet Security Threat report, the past year saw a 23% increase in the number of data breaches. Learn about some of the top...

Liability can change attitudes to corporate cybersecurity by John Smith

16/01/2016 07:27
Throughout the past century we’ve witnessed how liability, regulation and legislation have been instrumental in improving security and safety. As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of...

Cyber Liability: Are You Feeling Lucky? by Sandra Lovett-Tillman

14/01/2016 04:59
Security breaches such as physical, network, system security and data breaches can happen to any company, regardless of industry or size.  Recently, we’ve seen breaches at the U.S. Office of Personnel Management, Target, Anthem, Sony, Home Depot and JPMorgan Chase. A thought-provoking...

Increasing Demand for Cyber Insurance

09/01/2016 07:40
Due to the number of large data breach attacks in the past few years, more companies are recognizing how important it is to have cyber insurance coverage or to increase their coverage, and insurers have been streaming in to meet the market demand. Cyber insurance is a relatively new product,...

CEO & C-Level Executives Role in Data Breach Management by Nikos Georgopoulos

04/01/2016 10:30
    Because of the nature of the information managed and stored, cyber-breaches and cybersecurity are sources of insecurity for every company. As we have already seen in the most recent data-breaches, the way an organization handles a crisis, determines extensively if the CEO and...

5 Ways Your Healthcare Clients Can Avoid a Data Breach Posted by Mary Crogan

03/01/2016 15:19
A HIPAA risk assessment helps you identify potential issues and the steps you can take on behalf of your healthcare clients to reduce the risk of a data breach. But is it enough, does the statute and the assessment framework cover all of the potential threats? The answer is no. A...

Data Breaches In Healthcare Totaled Over 112 Million Records In 2015 by Dan Munro

03/01/2016 15:14
Healthcare’s “wall-of-shame” for 2015 officially ends tonight at midnight. It’s not really a “wall,” it’s just a website, but it’s the online mechanism for the Office of Civil Rights (OCR) under Health and Human Services to publish data breaches as reported to them and required by HIPAA....

The Internet of Things Is Everywhere, But It Doesn’t Rule Yet by David Pierce

30/12/2015 07:46
IN THE FUTURE, everything will be connected. It won’t just be our phones that access the Internet; it will be our light bulbs, our front doors, our microwaves, our comforters, our blenders. You can call it the Internet of Things, The Internet of Everything, Universal Object Interaction, or...
Items: 431 - 440 of 919
<< 42 | 43 | 44 | 45 | 46 >>