Rate predictions, forecasts and market insights for 30+ lines of insurance across North America....
Ransomware negotiation: Don't try this at home
Ransomware is on the rise in 2024 The global threat from ransomware is expected to increase over the next two years....
Ransomware is on the rise in 2024 The global threat from ransomware is expected to increase over the next two years....
Article / 2 months ago
Addressing The Cyber Gap With SMEs
Cyber security threats are one of the biggest risks to SMEs in 2024. Many don’t have the right type of insurance. How can brokers help address the cyber gap...
Cyber security threats are one of the biggest risks to SMEs in 2024. Many don’t have the right type of insurance. How can brokers help address the cyber gap...
Article / 3 months ago
The NIS2 Directive:What does it mean for cyber security?
Cyber security is never static, meaning the legislation we need to be able to protect and monitor the digital landscape has to be fast-moving and constantly evolving.
Cyber security is never static, meaning the legislation we need to be able to protect and monitor the digital landscape has to be fast-moving and constantly evolving.
Article / 5 months ago
Digital Twins: How to Recognise Their Cyber Security Threats
Research published by Altair in September 2022 revealed that 71% of the businesses they surveyed started investing in digital twins...
Research published by Altair in September 2022 revealed that 71% of the businesses they surveyed started investing in digital twins...
Article / 5 months ago
How AI has changed the threat landscape in 2023
Today, AI seems to make the news headlines on an almost daily basis and the pace of change in AI capability has been one of the main talking points...
Today, AI seems to make the news headlines on an almost daily basis and the pace of change in AI capability has been one of the main talking points...
Article / 8 months ago
Why do cyber insurers insist on IT security?
Every company is a technology company these days, so a robust information technology (IT) security...
Every company is a technology company these days, so a robust information technology (IT) security...
Article / 12 months ago
Creating the next generation of cyber insurance solutions - Insurance Business
Class underwriter digs into key cyber development...
Class underwriter digs into key cyber development...
Article / 12 months ago
Privileged Access Management is a critical element of internal cyber security
With an evolving threat landscape, understanding security protocols is vital. Read our guide on Privileged Access Management...
With an evolving threat landscape, understanding security protocols is vital. Read our guide on Privileged Access Management...
Article / 2 years ago
Cyber-Attacks and the Risk to Critical Infrastructure
Automated systems run most of our critical infrastructure, but are they vulnerable to cyber-attacks? Dr Jessica Barker from Cygenta discusses the threat...
Automated systems run most of our critical infrastructure, but are they vulnerable to cyber-attacks? Dr Jessica Barker from Cygenta discusses the threat...
Article / 2 years ago
Why do people fall for phishes?
With new threats, cyber literacy is vital for the continued success of businesses. Find out more about one of the most common cyber security threats...
With new threats, cyber literacy is vital for the continued success of businesses. Find out more about one of the most common cyber security threats...
Article / 2 years ago