What is a card data compromise?
A card data compromise occurs when payment card information is stolen from a merchant. Some examples of card data theft include:
Theft of card data...
Two years later, and the Target data breach continues to make headlines.
Does anyone need to be reminded that Target suffered a data breach in 2013? Seeing that the breach continues to be litigated...
Connected car, home and health technologies could substantially change insurers' value proposition. 60% of European top insurers have launched connected car solutions, but almost none has entered the...
Lloyd’s new report - Drones Take Flight: Key issues for insurance - looks at the challenges around the development of insurance solutions for drones.
Drones take flight: Key issues for insurance...
Cyber-risk is now firmly established as one of the most serious global risks. Last year saw an unprecedented number of high-profile cyber-attacks, while in January 2015 US health insurer Anthem...
News about cybersecurity and cyberattacks has changed. It seems that cyber criminals have broadened their focus beyond just data breaches involving personally identifiable information (PII) or...
State and federal banking regulators’ recent focus on cyber security and cyber insurance underscores the importance of procuring cyber insurance, both as a risk management tool and for purposes of...
It doesn’t require too great a leap to imagine a scenario where hackers infect computers in electricity generator control rooms with malware, causing a number of states across the United States to...
UK companies continue to face significant risks from cyber related crime and effects. In a bid to increase clarity on the kinds of risk, their insurability and the perspective of the industry, Marsh...
Insurers across the UK and North America fear a cyber attack that could compromise the increasing volumes of personal data that they are keeping and processing in the cloud.
Indeed, security has...
An independent cyber security consultant has described how Saudi Aramco had to get by on typewriters and paper, after the August 2012 cyber-attack that disabled more than 30,000 of the company's...
The risk of security breaches is higher than ever thanks to the boom in the Internet of Things (IoT) market, according to an industry group, which has published a list of guidelines on how to keep...
The insurance industry is built on the skill of its underwriters in assessing and pricing risk, but there are some indicators that suggest an aging workforce combined with a continuing lack of...
A report, Insurance Banana Skins 2015, a global study conducted by CSFI (Centre for the Study of Financial Innovation) in conjunction with PwC polled over 800 insurance practitioners and...
Locke Lord’s Privacy and Cybersecurity Group White Paper, “Everyone’s Nightmare: Privacy and Data Breach Risks” discusses legal and regulatory privacy, data security and breach notification...
Most FMCG companies sell 'dead products', in that once they're off the shelf, there's little more a brand can do to talk to a consumer.
The Internet of Things promises to change this, signalling...
Introduction
The "Internet of Things" (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the...
NEWS ANALYSIS: The recall of 1.4 million Fiat Chrysler vehicles to update software to prevent a difficult-to-execute hack of onboard control systems highlights the rising fears about Internet of...
Risks will drive a US$10 billion cyber insurance market by 2020, suggests ABI Research, a London, United Kingdom-based technology market intelligence company with offices in North America, Europe and...
2015: Time to Rethink Enterprise IT Security Executive Summary In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to...