New York, Feb. 20, 2018 (GLOBE NEWSWIRE) -- Cyber extortion, payroll diversion phishing attacks and fraudulent wire instruction are among the growing threats to business highlighted in the 2018...
1. Prepare a data map, which is a report on what personal data the company processes throughout its organization, where that data flows throughout the organization, where it is stored, who within the...
Today, the Council of Economic Advisers (CEA) released a report detailing the economic costs of malicious cyber activity on the U.S. economy. Please see below for the executive summary and read...
By Kevin Kalinich, Global Practice Leader – Cyber Insurance, Jacqueline Waters, Management Liability Legal & Claims Practice Leader and Chris Rafferty, US Sales & Growth Strategies...
Tokio Marine Kiln (TMK), the London-based provider of specialist and corporate insurance, has appointed Alex Jomaa as cyber underwriter. He takes up the role immediately and will report to Laila...
European cyber losses have affected organizations across Europe in recent years. 2017 was a particularly busy year as the region faced a series of cyber incidents including the Wannacry and NotPetya,...
A Mailjet study of 4,000 companies shows an average GDPR-readiness score of 4.1 out of 10.
A study by global email provider Mailjet shows that although 91 percent of startups say they’re collecting...
Key points of the recent ODPC guidance and the Article 29 Working Group guidance
The Article 29 Working Party (WP29) adopted guidance on the role of the Data Protection Officer (DPO) under the...
SAP study reflects people are selective about what data they'll share and why
As we approach implementation of the General Data Protection Regulation (GDPR) in Europe and brace for its repercussions...
Cybersecurity threats are emerging at a rapid pace and existing threats are intensifying tenfold. It’s a fast-growing insurance market worldwide, with many trying to get to grips with how to mitigate...
Following high-profile cyberattacks such as Petya and WannaCry, it’s easy to see why companies are dashing to get their hands on either technological solutions or appropriate insurance. And with a...
Currently, we stand between two paradigms in the regulation and preservation of privacy.
The U.S., as host to some of the world’s biggest tech giants, like Google and Facebook, relies on...
It’s time for insurers to wake up to the reality of their role in protecting companies from the fallout from cyber attacks, says Dan Trueman, the global head of cyber at AXIS Insurance.
The hype...
As the clock moves inexorably to a new year (and our look back at the past year is complete), it is time to pick up our crystal ball and predict what 2018 will bring. In the field of...
Experian's 2017-2018 Data Breach Response Guide
There are “leaders” and there are “laggards” when it comes to data breach incident response planning. While some organizations are taking incident...
When it comes to cyber threats and how they continue to evolve, Adam Cottini, managing director of Gallagher’s Cyber Liability practice, offers a chilling assessment: “You have the known and the...
Despite a series of high-profile cyber breaches, Willis Towers Watson P.L.C. said Tuesday that experts forecast cyber insurance rate increases of up to 5% for 2018.
The prediction was based on...
Over the last year, we have reached a new and important turning point in the struggle to manage cyber risk. In the war between cyber attackers and cyber defenders, we have reached what Winston...
While organizations understandably make significant investments in technology to defend against external cyber threats, their biggest security vulnerability is internal and hiding in plain sight:...
There are four major factors in cyber security that change constantly, creating meaningful impact to business and government cybersecurity programs:
Business trends and new technology...