Technology and data have transformed many industries--and obliterated others. (Been to a Blockbuster Video lately? Bought a BlackBerry in the last five years?) It's no overstatement to say that...
Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren't expected to slow down in 2016, Harry Greenspun,...
The number of U.S. data breaches tracked in 2015 totaled 781, according to a recent report released by theIdentity Theft Resource Center (ITRC) and sponsored by IDT911™. This represents the...
Companies are more worried than ever about the looming threat of hackers penetrating their networks. In the last year, the number of records exposed in data breaches rose 97%,...
On December 15, 2015, an agreement on the General Data Protection Regulation (GDPR) was reached following four years of negotiations between the European Commission, the European Parliament and the...
NEW YORK--(BUSINESS WIRE)--Kroll Bond Rating Agency (KBRA) released a research note outlining its views on the inconsistencies of public disclosures in describing the market for cyber insurance. The...
Tech Toys And The Child Protection In The Age Of The IoT.
The “Internet of things” (IoT) is no longer just a topic of conversation at your workplace or outside of it. It is no longer just a concept...
The Internet and related information and communications tools have delivered enormous benefits to the global economy. These gains, however, are expected to tail off as the technologies become...
A security firm’s annual security infrastructure report details the threats facing enterprise and organizations, with DDoS attacks continuing to be a significant disruptor.
It’s a report that...
Software with security flaws, and a lack of historical data on risks, have made the Internet of things tough to insure.
Insuring the security of connected products is hard for a simple reason:...
Mobile devices play a key role in the travel IoT
Whether it’s monitoring the performance of airline engines, enabling keyless entry to hotel rooms or helping tourists find their way around Disney...
Lloyd’s of London today announced that a set of common core data requirements for cyber risks has been agreed through ground breaking collaboration with modelling firms AIR Worldwide (AIR) and...
Cyber attacks continue to grow, with cyber thieves in pursuit of personally identifiable data that can be sold on the black market. According to the 2015 Symantec Internet Security Threat...
Throughout the past century we’ve witnessed how liability, regulation and legislation have been instrumental in improving security and safety. As Britain marks 50 years since the first seatbelt law...
Security breaches such as physical, network, system security and data breaches can happen to any company, regardless of industry or size. Recently, we’ve seen breaches at the U.S. Office of...
Due to the number of large data breach attacks in the past few years, more companies are recognizing how important it is to have cyber insurance coverage or to increase their coverage, and insurers...
Because of the nature of the information managed and stored, cyber-breaches and cybersecurity are sources of insecurity for every company. As we have already seen in the most...
A HIPAA risk assessment helps you identify potential issues and the steps you can take on behalf of your healthcare clients to reduce the risk of a data breach. But is it enough, does the...
Healthcare’s “wall-of-shame” for 2015 officially ends tonight at midnight. It’s not really a “wall,” it’s just a website, but it’s the online mechanism for the Office of Civil Rights (OCR)...
IN THE FUTURE, everything will be connected. It won’t just be our phones that access the Internet; it will be our light bulbs, our front doors, our microwaves, our comforters, our blenders. You...