Category Archives: Cyber Risk

Wearable Technology: Going Out On a Limb

wearable technology

Contactless payments are a relatively new but well known phenomenon; in the U.K. consumers spent more than £2.5 billion via the technology in the first half of 2015. Transport for London adopted the technology in September 2014, and in the … Continue reading →

Guide to Network Security and Cyber Coverage

network security

For years, network security professionals have been saying “either you have been data breached or you just do not know that you have been data breached.” As the lives of both private individuals and businesses are increasingly dominated by technology … Continue reading →

Social Engineering is Bigger Than Hacking—But Countermeasures Work

spear-phishing

All the major information security firms credit humans and social engineering, in the form of phishing and spear-phishing emails, as the root cause of most cyber-attacks. By using social engineering techniques, attackers can efficiently and cost effectively deliver malicious software, … Continue reading →

Cyber Attack Disrupts Ukrainian Power Grid; Boards Awaken to Threat

Ukraine-cyber-attack

At the end of December 2015, reports began to emerge from Ukraine that power grids across a region had been subject to cyber-attack. The attack targeted at least three power authorities in the Ivano-Frankivsk region of Ukraine, disconnecting electricity sub-stations … Continue reading →

Gaming Gets Serious on Addressing Online Dual Threats of Cyber-Attacks and Piracy

gamers

Within the world of game console systems, piracy is an ever-present threat and the potential consequences of a cyber-attack have spiraled upward, now that online gaming services have become an inextricable part of modern game consoles. Continue reading →

Top 10 of 2015 – #9: Emerging Cyber Risks of 2015

clouds circuit

Cyber, as we know, is an emerging issue provoking much discussion. It is probably true to say that the discussion is not well informed, driven as it is by a product-centric view of the cyber world, where those products really … Continue reading →

Cyber Public Relations Expenses

What makes a data breach response successful? How do we keep a data breach response from adding an additional nightmare to what was already a catastrophe? The answer may be hiding in plain sight within an underutilized benefit of your … Continue reading →

Two of the Most Important Pieces of Cyber Legislation Ever

A bit like London buses—you wait for ages and then two come along—two of the most significant pieces of European legislation ever affecting cyber liability have been announced by the European Commission in the last week. Continue reading →

The EU’s New Network and Information Security Directive

The country representatives from the European Union have forged the initial framework for the continent’s first cyber-security regulations. Continue reading →

Cyber: The ‘Big Picture’ Depends on Understanding the Details

cyber binoculars

Despite spending a ton of money on consultants and technology to address cyber vulnerabilities, financial directors still find themselves unable to quantify their residual cyber exposure. Further, they don’t know to what degree their existing insurance solutions provide cyber cover … Continue reading →