
In the report you’ll find:
An analysis of claims data from Coalition policyholders that details which industries are impacted most by cyber incidents, how small business claims...
Employee mistakes are having a potentially dire impact on enterprise cybersecurity, with 43% of workers admitting to making an error that had a negative impact on corporate digital security.
This is...
Vessels are becoming more connected to shore-based systems, meaning the cyber threat is ever-evolving - from crippling ports and terminals to spoofing attacks on ships.
The shipping community has...
Review of 2019
Despite increased investment in cyber security, the risk from attacks has increased significantly in the last year. In the qualitative review, three cybercrime...
Countdown to new IMO cyber guidelines deadline
Recognising current and emerging threats, the International Maritime Organization (IMO) has introduced new guidelines on cyber risk management in safety...
In conjunction with our member carriers, DCSA has published the DCSA Implementation Guide for Cyber Security on Vessels for the global container shipping industry. The purpose of the guide...
Last month the Information Commissioner's Office (ICO), the UK data protection regulator, imposed a monetary penalty notice of £500,000 on electronics retailer DSG Retail Limited (DSG), a company...
Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.
In a new poll of 2,800 cyber security...
The call came in by radio one evening last September, at around 9 p.m. On the line was the master of a tanker, approaching the end of a monthlong journey from the Port of South Louisiana...
We live in an age of innovation. Intangible assets, such as intellectual property, data, brands and technology, are of increasing strategic importance to businesses.
Protection is of essence...
Every day technology companies enable people to connect and businesses to operate in new and innovative ways. nning a technology company involves balancing client demands with the restraints...
Almost 60 years ago, Dwight Eisenhower gave his indelible speech on the military industrial complex. In the speech, he talked about the need “to find essential agreement on issues of great moment,...
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) has teamed up with Deloitte Risk & Financial Advisory on publishing new guidance on managing cyber risks in a...
Apart from configuring cybersecurity measures, the Chief Marketing Officer (CMO) needs to be responsible for taking up cybersecurity practices within their organization. Cybersecurity breaches often...
Welcome to F5 Labs’ third annual report on phishing and fraud. Once again, we’re bringing you data from our partner Webroot® as well as the F5 Security Operations Center.
Phishing continues...
There’s a road in my town that’s widely regarded as a speed trap. We all know drivers who say they were unfairly stopped and ticketed on it. I’ve never been and, come to think of it, neither has...
Cybercrime is reaching epidemic proportions. The “Official 2019 Annual Cybercrime Report,” based on research conducted by Cybersecurity Ventures predicts that cybercrime will cost companies across...
sHow to Rapidly and Effectively Respond to a Data Breach
Organizations that suffer a security incident must be prepared to rapidly respond.
Ideally, organizations will have a breach response plan...
(Bloomberg Markets) -- By the time Deb Dellapena arrived for work at Merck & Co.’s 90-acre campus north of Philadelphia, there was a handwritten sign on the door: The computers are down.
It was...
Insurance consultants are helping the hotel industry design incident response strategies and leading cyberattack simulation tests that involve all key stakeholders. The ultimate goal is to make...