Article archive

Data Breach Concerns With “Smart Vehicles” Shift Into Overdrive by Todd Rowe

04/01/2015 07:32
The vehicles we drive are becoming more like smart phones every day. Like smart phones, vehicles store valuable data that can be hacked. The vehicles currently on the market are equipped with everything from GPS capabilities to “black boxes,” similar to airplane flight recorders, which store data...

Cybersecurity 2015: Are We Near End of Big Retail Hacks? by Ben Dipietro Wall Street Journal

01/01/2015 13:07
Cybersecurity emerged as a much bigger risk for companies in 2014, and is likely to be a hot topic again in 2015. Given the importance of the subject—readers in our year-end compliance poll said cybersecurity would be the top compliance issue in 2015—we asked some top cybersecurity and...

Should Your Business Buy Cyber Insurance? by Jeff Peters

31/12/2014 08:25
Despite recent growth in the cyber insurance market, driven in part by a half dozen high-profile breaches making headlines in 2014, there's still a high level of confusion about coverage from business owners and even those who write the policies – as new attacks and new court cases continue to...

Cyber crime and the shipping industry

30/12/2014 11:17
This joint article from Kroll and diversified marine insurance provider Skuld was originally published as a Skuld member advisory. With the international shipping industry estimated to carry over 90 percent of today’s world trade, the temptation for criminals has never been greater. Savvy...

Auto insurers warily eye Google, Apple

29/12/2014 07:52
Tech giants loom as competitors in driver-monitoring devices Car-insurance industry, meet potential disrupters Google and Apple. Currently, nearly all mainstream insurers that offer driver-monitoring programs use relatively expensive devices that plug into a portal under the dashboard. Usage-based...

Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference by Pierluigi Paganini

28/12/2014 10:34
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights...

New market for hack-attack insurance takes root by Scott Tong

27/12/2014 20:27
For the second day, the digital Grinch has stolen Christmas for gamers around the globe. Networks went dark for Microsoft's Xbox and Sony Playstation users, with a group of hackers calling themselves Lizard Squad taking responsibility. It’s unclear if Sony or Microsoft had hacker...

Big Year for Hackers, Capped By Sony, Delivers Strong Sales to Insurers by Leslie Scism

25/12/2014 10:37
After years of hype about how cyberinsurance was poised to become an important product for property-casualty companies, 2014 appears to be the year the coverage finally, firmly caught hold, according to leading brokerage firms. The year started with headlines about the 2013 holiday hacker...

Sizing Up Cyber Risks after the Sony Breach by Travis Wall

25/12/2014 10:35
Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four new lawsuits concerning the disclosure of employees’ confidential...

Entry Point of JPMorgan Data Breach Is Identified by Matthew Goldstein, Nicole Perlroth and Michael Corkery

23/12/2014 06:52
The computer breach at JPMorgan Chase this summer — the largest intrusion of an American bank to date — might have been thwarted if the bank had installed a simple security fix to an overlooked server in its vast network, said people who have been briefed on internal and outside investigations into...
Items: 691 - 700 of 924
<< 68 | 69 | 70 | 71 | 72 >>