
The rush by companies eager to incorporate the Internet of Things in their operations could introduce potential cybersecurity threats, according to a study released Monday.
Eight-five percent of...
Receiving an extortion letter instructing to “pay us in bitcoins or your site will suffer a distributed denial-of-service (DDoS) attack” has become almost commonplace in the last two years. They say...
A Southern California hospital's computers have been restored after it paid a $17,000 ransom in bitcoins to hackers who infiltrated and disabled its network. The gambit isn't new, but it appears to...
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing. Cyber resilience supports...
Experts offer their opinions on important due diligence tasks when procuring cyber insurance.
With analysts projecting the cyber insurance market to heat up in the coming year, it's clear there are a...
Technology and data have transformed many industries--and obliterated others. (Been to a Blockbuster Video lately? Bought a BlackBerry in the last five years?) It's no overstatement to say that...
Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren't expected to slow down in 2016, Harry Greenspun,...
The number of U.S. data breaches tracked in 2015 totaled 781, according to a recent report released by theIdentity Theft Resource Center (ITRC) and sponsored by IDT911™. This represents the...
Companies are more worried than ever about the looming threat of hackers penetrating their networks. In the last year, the number of records exposed in data breaches rose 97%,...
On December 15, 2015, an agreement on the General Data Protection Regulation (GDPR) was reached following four years of negotiations between the European Commission, the European Parliament and the...
NEW YORK--(BUSINESS WIRE)--Kroll Bond Rating Agency (KBRA) released a research note outlining its views on the inconsistencies of public disclosures in describing the market for cyber insurance. The...
Tech Toys And The Child Protection In The Age Of The IoT.
The “Internet of things” (IoT) is no longer just a topic of conversation at your workplace or outside of it. It is no longer just a concept...
The Internet and related information and communications tools have delivered enormous benefits to the global economy. These gains, however, are expected to tail off as the technologies become...
A security firm’s annual security infrastructure report details the threats facing enterprise and organizations, with DDoS attacks continuing to be a significant disruptor.
It’s a report that...
Software with security flaws, and a lack of historical data on risks, have made the Internet of things tough to insure.
Insuring the security of connected products is hard for a simple reason:...
Mobile devices play a key role in the travel IoT
Whether it’s monitoring the performance of airline engines, enabling keyless entry to hotel rooms or helping tourists find their way around Disney...
Lloyd’s of London today announced that a set of common core data requirements for cyber risks has been agreed through ground breaking collaboration with modelling firms AIR Worldwide (AIR) and...
Cyber attacks continue to grow, with cyber thieves in pursuit of personally identifiable data that can be sold on the black market. According to the 2015 Symantec Internet Security Threat...
Throughout the past century we’ve witnessed how liability, regulation and legislation have been instrumental in improving security and safety. As Britain marks 50 years since the first seatbelt law...
Security breaches such as physical, network, system security and data breaches can happen to any company, regardless of industry or size. Recently, we’ve seen breaches at the U.S. Office of...